13.07.2015 Views

Prospective crime mapping in operational context Final report

Prospective crime mapping in operational context Final report

Prospective crime mapping in operational context Final report

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

1. UCL JILL DANDO INSTITUTE OF CRIMESCIENCE<strong>Prospective</strong> <strong>crime</strong> <strong>mapp<strong>in</strong>g</strong> <strong>in</strong> <strong>operational</strong><strong>context</strong>F<strong>in</strong>al <strong>report</strong>Shane D JohnsonDaniel J BirksL<strong>in</strong>dsay McLaughl<strong>in</strong>Kate J BowersKen PeaseUCL, Jill Dando Institute of Crime ScienceSecond Floor, Brooke House2-16 Torr<strong>in</strong>gton Place, LondonWC1E 7HN Tel. (020) 7679 0809Fax. (020) 7679 0828Email: shane.johnson@ucl.ac.ukOnl<strong>in</strong>e Report 19/07


AcknowledgementsThe authors are grateful to a number of people for their help and advice throughout thisproject. These <strong>in</strong>clude but are not limited to Assistant Chief Constable John Wright, DCI RickGooch and other members of the Command Team, Derbyshire ‘A’ Division. IntelligenceAnalysts Deborah Rimell and Bill Wallage, PC Hayley V<strong>in</strong>cent for fill<strong>in</strong>g out the tactical optionslog; Sergeant Kev<strong>in</strong> Pellatt and David Lynam (partnership analyst) from Safer DerbyshireResearch and Information Team who provided the data analysed; Inspector Matt Thompson‘A’ Division Community Safety; All ‘A’ Division front-l<strong>in</strong>e officers and Sergeants; Sgt AlanBeeson for driv<strong>in</strong>g L<strong>in</strong>dsay around to all the sections on the day of the surveys; SteveBrookes and Phil Taylor from Government Office for the East Midlands; and, MichaelWilk<strong>in</strong>son, L<strong>in</strong>dsey Poole, Mark Bangs, Steve Wilkes and Niall Hamilton-Smith from the HomeOffice. We would also like to thank two anonymous reviewers for their <strong>in</strong>sightful comments.i


ContentsAcknowledgementsExecutive summaryiv1. Introduction 1Background and past research 1Aims and objectives 32. Test<strong>in</strong>g the generalisability of prospective <strong>mapp<strong>in</strong>g</strong> 4Is the risk of burglary communicable <strong>in</strong> the East Midlands? 6Predict<strong>in</strong>g the future 183. Tactical options and select<strong>in</strong>g a pilot site 28Potential pilot sites 28A tactical options matrix for reduc<strong>in</strong>g burglary 304. System development and evolution 38Time of day consistency? 39Conclusion 415. Process evaluation 43Process evaluation methodology 43‘A’ Division, management and day-to-day runn<strong>in</strong>g 44IT and dissem<strong>in</strong>ation 45Tactical delivery 52Summary 576. Changes <strong>in</strong> patterns of burglary 59Change <strong>in</strong> the time of day burglaries were committed 627. Conclusions 67References 70Appendices1 The <strong>in</strong>formation technology nexus 742 <strong>Prospective</strong> Mapp<strong>in</strong>g Survey 793 Detailed evaluation methodology 834 Promap graphical user <strong>in</strong>terface and an illustration (step by step) of how thesystem is used 95List of tables2.1 Knox cont<strong>in</strong>gency table example 42.2 Knox ratios for Mansfield 72.3 Monte-Carlo results for Mansfield 72.4 Weekly Knox ratios for Mansfield 82.5 Knox ratios for Well<strong>in</strong>gborough 82.6 Monte-Carlo results for Well<strong>in</strong>gborough 92.7 Weekly Knox ratios for Well<strong>in</strong>gborough 9ii


2.8 Knox ratios for Ashfield 102.9 Monte-Carlo results for Ashfield 102.10 Weekly Knox ratios for Ashfield 112.11 Knox ratios for Corby 112.12 Monte-Carlo results for Corby 122.13 Knox ratios for ‘A’ Division 122.14 Monte-Carlo results for ‘A’ Division 132.15 Weekly Knox ratios for ‘A’ Division 132.16 Summary of the analyses concerned with the communicability of risk 142.17 Weekly Knox analysis for area 1 152.18 Weekly Knox analysis for area 2 162.19 Weekly Knox analysis for area 3 162.20 Weekly Knox analysis for area 4 162.21 Weekly Knox analysis for area 5 172.22 Average number of <strong>crime</strong>s correctly identified per forecast for cumulative methods232.23 Average percentage of <strong>crime</strong>s correctly identified per forecast 232.24 Average number of <strong>crime</strong>s correctly identified per forecast for s<strong>in</strong>gle po<strong>in</strong>t methods242.25 Average percentage of <strong>crime</strong>s correctly identified per forecast 242.26 Predictive accuracy for analyses for which the same number of cells wereidentified by each method 253.1 Comparison of three potential pilot sites 293.2 Tactical options matrix 324.1 Accuracy of the prospective model <strong>in</strong>clud<strong>in</strong>g the opportunity surface 385.1 Number of times prospective maps were used <strong>in</strong> ‘A’ Division’s daily brief<strong>in</strong>g 525.2 Sample characteristics 535.3 Number of respondents who had heard of prospective <strong>mapp<strong>in</strong>g</strong>, by section 545.4 Number of times maps were used for targeted police activity 545.5 Number of respondents who were either <strong>in</strong>volved <strong>in</strong> or responsible foremploy<strong>in</strong>g <strong>operational</strong> tactics, by section 555.6 The <strong>in</strong>terpretation and usefulness of prospective maps 566.1 Change <strong>in</strong> the volume of burglary and odds-ratio statistics 62A 3.1 Change <strong>in</strong> the volume of burglary and odds-ratio statistics 85List of figures2.1 The five polic<strong>in</strong>g areas <strong>in</strong> ‘A’ Division 152.2 Two-dimensional and three-dimensional hotspot lattices 192.3 Opportunity surface for ‘A’ Division 212.4 Differences <strong>in</strong> cells identified as be<strong>in</strong>g at the highest future risk byretrospective and prospective methods 25iii


2.5 Illustration of a simple nearest neighbour analysis for two data sets 262.6 Nearest neighbour <strong>in</strong>dex: retrospective and prospective methods 274.1 Similarity <strong>in</strong> time of day for near-repeats and unrelated burglaries 404.2 An example image of the f<strong>in</strong>al GUI 415.1 Promap dissem<strong>in</strong>ation process across ‘A’ Division 485.2 A series of predictions for one area 495.3 Timel<strong>in</strong>e for prospective <strong>mapp<strong>in</strong>g</strong> pilot <strong>in</strong> ‘A’ Division 516.1 Time-series graph of the count of burglary before and dur<strong>in</strong>g pilot 616.2 Changes <strong>in</strong> the proportion of burglaries committed dur<strong>in</strong>g the even<strong>in</strong>g overtime (for events for which the <strong>in</strong>terval between the earliest and latest <strong>report</strong><strong>in</strong>gtimes was less than eight hours) 636.3 Changes <strong>in</strong> the proportion of burglaries committed dur<strong>in</strong>g the morn<strong>in</strong>g overtime (for events for which the <strong>in</strong>terval between the earliest and latest <strong>report</strong><strong>in</strong>gtimes was less than eight hours) 646.4 Changes <strong>in</strong> the proportion of burglaries committed dur<strong>in</strong>g the daytime overtime (for events for which the <strong>in</strong>terval between the earliest and latest <strong>report</strong><strong>in</strong>gtimes was less than eight hours) 656.5 Changes <strong>in</strong> the proportion of burglaries committed dur<strong>in</strong>g the even<strong>in</strong>g overtime (for events for which the <strong>in</strong>terval between the earliest and latest <strong>report</strong><strong>in</strong>gtimes was less than eight hours) 66A1.1 Internal application utilis<strong>in</strong>g exist<strong>in</strong>g GIS for visualisation 75A1.2 Stand-alone application utilis<strong>in</strong>g exist<strong>in</strong>g GIS 76A1.3 Stand-alone application with <strong>in</strong>tegrated GIS 77A3.1 Changes <strong>in</strong> the spatial distribution of risk follow<strong>in</strong>g the <strong>in</strong>troduction of the pilot 88A3.2 Lorenz curves show<strong>in</strong>g the distribution of burglary risk 90A3.3 An illustration of a triple (bottom) and quad cha<strong>in</strong> (top) 91A3.4 The proportion of events belong<strong>in</strong>g to different k-event series before anddur<strong>in</strong>g the pilot 93A5.2 An enlargement of the shift analysis options 96A5.3 An example of fictitious prospective map 96A5.4 Map navigational options 97A5.5 <strong>Prospective</strong> map magnified to neighbourhood level 97A5.6 <strong>Prospective</strong> map magnified to street level 98A5.7 <strong>Prospective</strong> map magnified to household level 98iv


Executive summaryThe systematic identification and management of risk is one element <strong>in</strong> the Home Office’sreform plan published on 19 July 2006, with a stated emphasis on proactivity <strong>in</strong> riskmanagement. The research <strong>report</strong>ed here provides an <strong>in</strong>novative means of do<strong>in</strong>g preciselythat <strong>in</strong> respect of one offence, describ<strong>in</strong>g and apply<strong>in</strong>g a technique whose extension to alloffence types would make a significant contribution to realisation of the Home Office’s reformagenda.Know<strong>in</strong>g when and where to deploy resources is pivotal to the <strong>crime</strong> reduction enterprise.The attempt to identify and police ‘hotspots’ of <strong>crime</strong> has for some time been a part of <strong>crime</strong>reduction strategy. The positive effects of such measures have been acknowledged, with arange of <strong>in</strong>terventions based on this approach hav<strong>in</strong>g significant impacts on levels of <strong>crime</strong>.The aim of the project <strong>report</strong>ed here is to understand the regularities <strong>in</strong> patterns of burglaryacross a range of geographical areas and to develop and test an emerg<strong>in</strong>g forecast<strong>in</strong>gtechnique, prospective <strong>mapp<strong>in</strong>g</strong>, thereby help<strong>in</strong>g the police and their <strong>crime</strong> reduction partnersto prevent and detect more <strong>crime</strong>.The risk of burglary is not evenly distributed – some areas experience more burglary thanothers. With<strong>in</strong> areas, some homes are victimised more than the rest. However, little researchhas focused on the accurate prediction of which areas and locations are most likely toexperience burglary next. Research concerned with <strong>crime</strong> <strong>mapp<strong>in</strong>g</strong> has focused almostexclusively on the description of what happened last week, last month or over the last year,with the implicit assumption that the future will be much like the past. Insofar as <strong>crime</strong> moves(and it does), such an approach is at best sub-optimal. The current study sought to developan accurate way of forecast<strong>in</strong>g where burglary is most likely to next occur, and to decidewhether the result<strong>in</strong>g system had potential for use <strong>in</strong> <strong>operational</strong> polic<strong>in</strong>g. In addition toaddress<strong>in</strong>g the technical issues of how to forecast future patterns of burglary, the authorsattempted to identify issues of implementation that might impede police adoption of predictive<strong>mapp<strong>in</strong>g</strong> systems and how such <strong>mapp<strong>in</strong>g</strong> might be <strong>in</strong>tegrated with other approaches to <strong>crime</strong>reductionSpatial and temporal patterns of <strong>crime</strong> are fluid. Research by the authors and others haddemonstrated that the risk of burglary appears not only to move, but to cluster <strong>in</strong> space andtime <strong>in</strong> much the same way as a communicable disease. When a burglary occurs at onehome, another is likely to occur swiftly nearby. As time elapses, this risk decays so that afterfour to eight weeks, homes located near to a previously victimised home experience only alevel of risk normal for the area <strong>in</strong> which they are located. If such patterns are ubiquitous (anotion supported by the work <strong>report</strong>ed), the risk of burglary moves. The consequence is thatthe location of future events might be better predicted by means more sophisticated than thesimple extrapolation of past patterns.The central aims of the project were as follows.• To determ<strong>in</strong>e whether patterns of burglary were communicable across diverse areasof the East Midlands, and if so, whether the pattern varied between areas.• To develop a predictive <strong>mapp<strong>in</strong>g</strong> system usable <strong>in</strong> an <strong>operational</strong> polic<strong>in</strong>g <strong>context</strong>.• To test the accuracy of the system and compare it with contend<strong>in</strong>g alternatives.• To determ<strong>in</strong>e how the system could be used <strong>operational</strong>ly, identify obstacles toimplementation, establish how it was received by those who might use it, and identifynecessary ref<strong>in</strong>ements.• To provide an idea of the likely efficacy of the system dur<strong>in</strong>g a field trial by evaluat<strong>in</strong>gits impact on <strong>crime</strong> and <strong>in</strong>fluence on <strong>crime</strong> reduction strategies <strong>in</strong> the area.v


Project outcomesPatterns of burglaryUs<strong>in</strong>g a modification of an approach developed <strong>in</strong> the field of epidemiology, analyses wereconducted to see if burglary does cluster <strong>in</strong> space and time and if the patterns vary acrosslocation. Briefly, to do this, for each area each burglary event is compared to every other andthe space-time distance between them recorded. The pattern of results observed is thencompared with what would be expected on the basis of chance, determ<strong>in</strong>ed us<strong>in</strong>g what isknown as a Monte-Carlo simulation. Burglary was considered to be communicable if moreevents occurred near to each other <strong>in</strong> both space and time than would be expected on thebasis of chance.Without exception <strong>in</strong> the East Midlands areas studied, the risk of burglary is communicable upto a distance of around 400m for at least one month. This f<strong>in</strong>d<strong>in</strong>g was used as a general rule<strong>in</strong> the construction of basic prospective maps. Sensitivity analyses were conducted toexam<strong>in</strong>e the duration of the elevation <strong>in</strong> risk. These suggested that risk (albeit dim<strong>in</strong>ish<strong>in</strong>g)extended beyond one month and <strong>in</strong> most cases up to around eight weeks.The patterns were to some extent specific to the time of day considered. For example, if aburglary occurred at one location dur<strong>in</strong>g the afternoon, a further burglary was more likelynearby soon after and at a similar time of day. In supplementary work not <strong>report</strong>ed here, theftfrom (but not theft of) vehicles was also found to be communicable.Develop<strong>in</strong>g the predictive system and measur<strong>in</strong>g its accuracyOn the basis of the above f<strong>in</strong>d<strong>in</strong>gs, a method of prospective <strong>mapp<strong>in</strong>g</strong> (hereafter, Promap),based on the authors’ previous work, was developed. Across the different areas studied <strong>in</strong>the <strong>in</strong>itial phase of the research, police analysts were already us<strong>in</strong>g descriptive hotspot<strong>mapp<strong>in</strong>g</strong>. Promap was tested aga<strong>in</strong>st an optimised version of the ‘retrospective’ hotspott<strong>in</strong>gmethod <strong>in</strong> current use. The optimised versions were substantially more predictive than mapswhich resemble those typically used <strong>in</strong> <strong>crime</strong> analysis. Promap outperformed the optimised‘retrospective’ hotspot <strong>mapp<strong>in</strong>g</strong> system. It did this <strong>in</strong> three ways.• Promap correctly predicted more burglaries than other methods. For example, the f<strong>in</strong>alversion of Promap could identify the locations of 78 per cent burglaries that occurredwith<strong>in</strong> the next seven days of a forecast, whereas for the same <strong>in</strong>terval theretrospective model could identify only 51 per cent.• Relative to the retrospective maps, it yielded hotspots which formed more solid,coalescent, hence readily patrollable, areas.• The f<strong>in</strong>al version of Promap accurately predicted more <strong>crime</strong> while identify<strong>in</strong>g a smallerarea than other methods. For example, the same fraction of burglaries occurr<strong>in</strong>g with<strong>in</strong>two to seven days of a prediction could be forecasted by identify<strong>in</strong>g patroll<strong>in</strong>g areas halfthe size of those generated by retrospective mapsImplications for <strong>operational</strong> polic<strong>in</strong>gResearch conducted by the authors and others suggests that police officers’ perceptions ofwhere burglary hotspots form are often imperfect. This is particularly true for recent ratherthan endur<strong>in</strong>g problems. The fluidity of burglary risk provides an explanation for this. Crimemoves and patterns evolve. Why should police officers be able to anticipate such changes?They should not, but computerised support systems that can assist <strong>in</strong> the <strong>crime</strong> reductionenterprise should.The advantages of Promap are that it could act to facilitate more targeted <strong>crime</strong> reduction<strong>in</strong>terventions, <strong>in</strong>creas<strong>in</strong>g the likelihood that resources are deployed to the right places at theright time, rather than where they were needed last week or last month (as with conventionalhotspot methods). Risky areas can be better def<strong>in</strong>ed so that patrols could move throughpriority areas more efficiently, spend<strong>in</strong>g less time <strong>in</strong> places with lower risk. The maps can alsobe produced for specific shifts to ensure their cont<strong>in</strong>ued relevance over the course of the day.vi


Develop<strong>in</strong>g predictive <strong>mapp<strong>in</strong>g</strong> <strong>in</strong> an <strong>operational</strong> polic<strong>in</strong>g <strong>context</strong>Support systems are only valuable if they can be used and understood by those operat<strong>in</strong>gthem. Promap software was developed for use <strong>in</strong> one police Basic Command Unit (BCU) <strong>in</strong>the East Midlands <strong>in</strong> consultation with local police and community safety practitioners. Us<strong>in</strong>gthe software, maps could easily be produced at regular <strong>in</strong>tervals by <strong>crime</strong> analysts, discusseddur<strong>in</strong>g shift brief<strong>in</strong>gs and provided to beat officers. The maps clearly def<strong>in</strong>ed the areas withthe highest predicted risks, aga<strong>in</strong>st a background of the hous<strong>in</strong>g distribution and significantgeographical po<strong>in</strong>ts of reference, which could then be used as guides to patroll<strong>in</strong>g. Inresponse to feedback, different maps were generated for each of the three police shifts of theday.The system was modified <strong>in</strong> response to practitioner requests. Considerable effort wasexpended to optimise the algorithms used to ensure that the system could generate mapsrapidly. The f<strong>in</strong>al version could generate maps for the entire participat<strong>in</strong>g BCU <strong>in</strong> around 20seconds. A different system which generates descriptive (i.e. not predictive) maps, took tenm<strong>in</strong>utes to complete an analysis of the same area, with extra time required to display theresult<strong>in</strong>g output.Issues of implementation encountered <strong>in</strong> situFollow<strong>in</strong>g consultation with the staff <strong>in</strong> the pilot BCU and their <strong>crime</strong> reduction partners, thesystem was modified and used <strong>in</strong> an <strong>operational</strong> <strong>context</strong> over a period of six months.Promaps were generated for each of five sections which comprised the BCU by <strong>crime</strong>analysts located at police headquarters, and dissem<strong>in</strong>ated us<strong>in</strong>g the force IT system.A process evaluation was conducted over the implementation period to see how the systemwas used. This <strong>in</strong>volved observation of brief<strong>in</strong>g meet<strong>in</strong>gs, a log of the tactical options used <strong>in</strong>response to the maps, and a survey of front-l<strong>in</strong>e police officers.Issues with system implementation• Despite the fact that the system itself was considered simple to use, changes of keypersonnel (<strong>in</strong>clud<strong>in</strong>g the BCU commander) and force IT requirements (which <strong>in</strong>itiallyrendered the system unnecessarily complex) made for a slow start. Those surveyedcame to regard it as useful to the po<strong>in</strong>t of enquir<strong>in</strong>g about the possibility of its extensionto cover other <strong>crime</strong> types.• Timely dissem<strong>in</strong>ation of relevant maps to front-l<strong>in</strong>e officers was a source of <strong>in</strong>itialdifficulty, resolved to general satisfaction distress<strong>in</strong>gly late <strong>in</strong> the pilot period. At firstthere were issues with the physical transfer of maps from the <strong>crime</strong> analysts, located atpolice headquarters, to the staff throughout the BCU. The maps were <strong>in</strong>itially generateddaily but beat officers felt that there were only m<strong>in</strong>or changes <strong>in</strong> the maps whengenerated with this frequency. Eventually, these issues were partially resolved byprovid<strong>in</strong>g local staff access to the <strong>mapp<strong>in</strong>g</strong> software, and by produc<strong>in</strong>g the maps twicea week. Implementation issues of this k<strong>in</strong>d currently represent one of the mostimportant limit<strong>in</strong>g factors <strong>in</strong> prospective <strong>mapp<strong>in</strong>g</strong> utility, but their resolution is mostly amatter of ensur<strong>in</strong>g that basic IT <strong>in</strong>frastructure is adequately configured, and the systemis not hobbled by adherence to IT custom and practice.• Part of this project <strong>in</strong>volved a review of possible tactical options that could be used <strong>in</strong>conjunction with the new maps. These ranged from well-established anti-burglary<strong>in</strong>itiatives, such as target harden<strong>in</strong>g and police patrols to novel techniques suggested <strong>in</strong>the light of the burglary patterns found. The review of each technique <strong>in</strong>cludeddocumented success or failure, f<strong>in</strong>ancial costs, and the speed with whichimplementation was plausible, swiftness of implementation be<strong>in</strong>g important <strong>in</strong> thecurrent project.It appeared that the most favoured methods were those that comb<strong>in</strong>ed the maps withother local <strong>in</strong>telligence (such as data on known offenders) to direct police patrols, andvii


those that <strong>in</strong>volved collaboration with other <strong>crime</strong> prevention partners. The po<strong>in</strong>t ofcentral importance is that the availability of accurate prospective maps requiresreconsideration of tactical options <strong>in</strong> order for their potential to be realised.• Interviews with front-l<strong>in</strong>e officers were undertaken towards the end of the project.Across the five sections of the BCU, there were differences <strong>in</strong> the degree to whichofficers could def<strong>in</strong>e what the system actually did. In one area, only 27 per cent ofofficers <strong>in</strong>terviewed could provide an accurate description, although <strong>in</strong> the rema<strong>in</strong><strong>in</strong>gfour areas a better understand<strong>in</strong>g was apparent, with 75-92 per cent provid<strong>in</strong>g gooddef<strong>in</strong>itions. There were also differences across the five areas with respect to howfrequently the maps were <strong>report</strong>ed to have been used to <strong>in</strong>form police tactics.Typically, the maps were <strong>report</strong>ed to have been used more often <strong>in</strong> those areas <strong>in</strong>which officers had a better understand<strong>in</strong>g of Promap. This suggests that further effortshould be expended to ensure that officers have a full appreciation of the approachbefore implementation beg<strong>in</strong>s.• There was a marked reduction of domestic burglary dur<strong>in</strong>g the pilot study. This was amixed bless<strong>in</strong>g. On the plus side, burglary decl<strong>in</strong>ed more <strong>in</strong> the pilot area than <strong>in</strong> thecomparison area, and decl<strong>in</strong>ed most dur<strong>in</strong>g the shift for which the police had thegreatest opportunity to use, and <strong>report</strong>ed most frequently us<strong>in</strong>g, Promap. On thenegative side, this meant that priorities other than domestic burglary came to the fore,with dim<strong>in</strong>ished use of the maps as a consequence. Further, the decl<strong>in</strong>e <strong>in</strong> burglarywas evident when implementation was at a rudimentary stage, and hence it is difficultto attribute the change to Promap. A fair test of the potential of prospective <strong>mapp<strong>in</strong>g</strong>may only be realised when the method is tested across a range of areas and ideallywhen it is extended to cover a range of <strong>crime</strong> types. This was beyond the scope of thecurrent project, for which the aim was to determ<strong>in</strong>e the potential utility of the system.This research design is consistent with cl<strong>in</strong>ical trials of new pharmaceuticals, wherebydifferent phases of the trial are used to evaluate the efficacy of the drug. The <strong>in</strong>itialphase, analogous to the approach adopted here, is essentially designed to uncover anyproblems with the drug and potential effectiveness rather than to demonstrate asystematic effect.An important element of the research was to ga<strong>in</strong> feedback from those <strong>in</strong>volved <strong>in</strong> the pilot<strong>in</strong>gprocess to assess the potential of this type of system. A key message from this process wasthat the development of Promap is seen as a promis<strong>in</strong>g route towards <strong>in</strong>telligence-drivenpolice patroll<strong>in</strong>g and the <strong>in</strong>formed allocation of responsibilities with<strong>in</strong> <strong>crime</strong> and disorderreduction partnerships. This is evidenced by the fact that (as noted above) officers enquiredabout the potential (immediate) development of the system for other types of <strong>crime</strong>, <strong>in</strong>clud<strong>in</strong>gtheft from a vehicle.RecommendationsThe potential applications of Promap are manifold. It would have been too much to expectthat this potential could be fully exploited with<strong>in</strong> a six-month trial period, where all parties werestart<strong>in</strong>g from scratch. Listed below are a number of recommendations for implementation thatcould help realise improvements <strong>in</strong> <strong>operational</strong> practice, and a consequent reduction <strong>in</strong> <strong>crime</strong>.• Police officers located <strong>in</strong> diverse areas could be consulted <strong>in</strong> the development of themaps so that their <strong>operational</strong> usefulness can be tailored to different <strong>context</strong>s. Mapscould dist<strong>in</strong>guish between areas for which risks are <strong>in</strong>creas<strong>in</strong>g and those for whichthe level of risk is stable or decl<strong>in</strong><strong>in</strong>g. Which type of map is most useful may dependupon resources available and problem profiles. Bespoke <strong>mapp<strong>in</strong>g</strong> systems, locallyoptimised and responsive to task<strong>in</strong>g and co-ord<strong>in</strong>ation wishes are feasible.• All those tasked with act<strong>in</strong>g upon the maps might be provided with regular<strong>in</strong>formation, which could become an <strong>in</strong>tegral part of the daily rout<strong>in</strong>e. If possible, newmaps should be provided two to three times per week and display shift-specific risks.viii


• To ma<strong>in</strong>ta<strong>in</strong> momentum the system could either become part of the long-termrout<strong>in</strong>es of <strong>operational</strong> polic<strong>in</strong>g or used for time-limited highly resourced operations. Amiddle ground, where attention is only paid when burglary is a priority, would limit theutility and understand<strong>in</strong>g of the system.• Risks identified by Promap could usefully be comb<strong>in</strong>ed with other forms of <strong>in</strong>telligenceto optimise operations. For example, high risk areas could be scanned for trends <strong>in</strong>data on modus operandi or for <strong>in</strong>formation on known offenders which could help focuspolice tactics. This type of analysis could, to some extent, be automated, therebyfree<strong>in</strong>g analyst time to allow a more thorough <strong>in</strong>terrogation of patterns, and for themto consider the range of <strong>crime</strong> reductive responses possible.• It would be desirable to develop procedures that enabled evaluation of the systemwithout any demand on police time or resources. For example, an <strong>in</strong>dex of changes <strong>in</strong>the patterns of <strong>crime</strong> cluster<strong>in</strong>g over time could be automatically produced andrecorded. Evaluation would also be facilitated by systematic documentation of theactivities and arrests made by beat officers, although any paperwork burden wouldneed to be m<strong>in</strong>imised, perhaps through the use of a simple computerised datacollection tool.• In any <strong>mapp<strong>in</strong>g</strong> system, the risks identified are relative to the level of <strong>crime</strong> <strong>in</strong> aparticular area, and to the time frame selected for analysis. Hence it is possible toproduce maps show<strong>in</strong>g areas of relatively high risk even when there is a lull <strong>in</strong> theunderly<strong>in</strong>g problem. Thus, for the <strong>crime</strong> type(s) predicted some <strong>in</strong>dication of theanticipated scale of the problem would be a useful additional feature of the system.• The authors believe that Promap should be extended to other <strong>crime</strong> types, such asvehicle <strong>crime</strong> and violence. Predictions may be produced for all <strong>crime</strong> (if subsequentempirical research suggests this to be sensible) and weighted by seriousness of each<strong>crime</strong> type. Because different types of <strong>crime</strong> might require different solutions, an<strong>in</strong>dication of the anticipated volume of each type could be provided as an <strong>in</strong>dication ofwhat to prioritise and when.As noted above, the use of forecast<strong>in</strong>g systems such as Promap should encourage thecont<strong>in</strong>ual consideration and reconsideration of <strong>operational</strong> tactics. Favoured approaches mayrequire reth<strong>in</strong>k<strong>in</strong>g when it is possible to more accurately predict where resources are mostneeded.The future?It is believed that the development of the techniques described will offer a step change <strong>in</strong> thepower and applicability of <strong>crime</strong> <strong>mapp<strong>in</strong>g</strong> as a tool of <strong>crime</strong> reduction. In perhaps fifteenyears, us<strong>in</strong>g techniques such as those discussed here and those as yet unrealised, predictive<strong>mapp<strong>in</strong>g</strong> could be available for all <strong>crime</strong> types; real time <strong>in</strong>formation on risk would therebybecome available to police patrols, where the seriousness of different <strong>crime</strong> types is weightedautomatically so that an optimal patroll<strong>in</strong>g pattern is provided to each police vehicle tomaximise the total seriousness of <strong>crime</strong>s to be preventively patrolled. Us<strong>in</strong>g Promap typesystems <strong>in</strong> concert with Lab-on-a-chip forensic test<strong>in</strong>g, where DNA and other tests would bepossible <strong>in</strong> police vehicles, would facilitate swift forensic identification of perpetrators of<strong>crime</strong>s not prevented, and patroll<strong>in</strong>g <strong>in</strong>formed by Promap would mean faster response timesto arrive before <strong>crime</strong> scenes are compromised for forensic purposes. In parallel withoptimised patroll<strong>in</strong>g, Promap would deliver <strong>in</strong>formation about longer-term patterns andstabilities <strong>in</strong> <strong>crime</strong> and disorder to Crime and Disorder Reduction Partnerships, enabl<strong>in</strong>g themto put <strong>in</strong> place design and ma<strong>in</strong>tenance changes. Noth<strong>in</strong>g <strong>in</strong> such a future is unfeasible evenwith today’s technology. It does however require an effort of imag<strong>in</strong>ation to discern thecentrality of prospective <strong>mapp<strong>in</strong>g</strong> to such a future. While the East Midlands study <strong>report</strong>edhere was <strong>in</strong> most respects successful, the big prizes of <strong>in</strong>telligent <strong>crime</strong> reductive practice willbe won only through an <strong>in</strong>tegrated developed programme rather than a succession of ad hocpiecemeal projects.ix


1. IntroductionThis <strong>report</strong> represents a summary of a project concerned with short-term burglary prediction.The work was completed <strong>in</strong> three stages, a short <strong>in</strong>itial research phase to develop andestablish the accuracy of the method, a short development phase dur<strong>in</strong>g which the systemwas ref<strong>in</strong>ed for use <strong>in</strong> one police Basic Command Unit (BCU) with tactical implicationsidentified and discussed, and f<strong>in</strong>ally a six-month field trial to test whether the system could beused <strong>in</strong> an <strong>operational</strong> <strong>context</strong> and how the police engaged with it.The structure of this <strong>report</strong> largely follows the chronology of the research, thereby provid<strong>in</strong>gthe reader with an impression of substance and sequence. The first section is a review of theliterature that <strong>in</strong>formed the project, and the second the empirical research, <strong>in</strong>itial developmentand test<strong>in</strong>g of the system. The third section conta<strong>in</strong>s a discussion of the types of tacticaloption that were orig<strong>in</strong>ally identified as hav<strong>in</strong>g the potential to be used with the system, or atailored variant of it, and the wider ideology of the approach. The fourth section discussesf<strong>in</strong>al ref<strong>in</strong>ements to the system used <strong>in</strong> the field trial, and then reviews how the system waseventually used and police officers’ perceptions of its utility. Lessons learned regard<strong>in</strong>gimplementation are also highlighted and discussed. In the penultimate section, changes <strong>in</strong>patterns of <strong>crime</strong> co<strong>in</strong>cident with the work are explored, and <strong>in</strong> the f<strong>in</strong>al section futuredirections and recommendations are discussed.Background and past researchCrim<strong>in</strong>ological research has demonstrated that <strong>crime</strong> is concentrated. For all <strong>crime</strong> typesanalysed, a small number of victims are repeatedly victimised and hence experience a largeproportion of <strong>crime</strong> (for reviews, see Pease, 1998; Farrell, 2005); a large proportion of <strong>crime</strong>occurs <strong>in</strong> a small number of areas; and a small number of offenders commit a large proportionof <strong>crime</strong> (e.g. Spelman, 1994). In relation to the geographical distribution of <strong>crime</strong>, thismanifests itself as spatial cluster<strong>in</strong>g, with ‘hotspots’ of <strong>crime</strong> such as burglary be<strong>in</strong>g a typicalcharacteristic of deprived areas (e.g. Johnson et al., 1997). These f<strong>in</strong>d<strong>in</strong>gs conform to what ismore generally known as the 80:20 rule. This pattern is not conf<strong>in</strong>ed to <strong>crime</strong> but is a moregeneral phenomenon. For <strong>in</strong>stance, a small proportion of the earth’s surface holds themajority of life on the planet, and a small proportion of earthquakes account for the majority ofdamage caused by them (Clarke and Eck, 2003).For burglary, the focus of the current research, the relationship between different types ofconcentration has also been studied. Specifically, are <strong>in</strong>cidents of repeat burglaryvictimisation the work of a common offender, or do different offenders simply exploit the sameopportunities for <strong>crime</strong>? These explanations have been referred to with<strong>in</strong> the literature as theboost and flag hypotheses, respectively (Pease, 1998). A number of approaches to<strong>in</strong>vestigat<strong>in</strong>g these hypotheses exist, but perhaps the most direct is to exam<strong>in</strong>e data fordetected offences. In their analysis of a sample of data for offenders detected for burglaryoffences, Everson and Pease (2001) demonstrate that 86 per cent of the <strong>in</strong>cidents of repeatvictimisation were committed by the same offenders (see also Everson, 2003). Furthercorroborative evidence comes from studies <strong>in</strong> which offenders have been <strong>in</strong>terviewedregard<strong>in</strong>g their offend<strong>in</strong>g behaviour. Typical f<strong>in</strong>d<strong>in</strong>gs illustrate that around one <strong>in</strong> threeburglars admit to return<strong>in</strong>g to the same property to commit a further offence (Gill andMathews, 1994; Ashton et al. 1998) and their reasons for so do<strong>in</strong>g <strong>in</strong>clude the follow<strong>in</strong>g:“the house was associated with low risk …., they were familiar with the features of thehouse …., to get th<strong>in</strong>gs left beh<strong>in</strong>d or replaced goods.”Ericsson, 1995Perhaps the most succ<strong>in</strong>ct account was given by a Scottish burglar to Mandy Shaw. Uponasked why he returned, he replied “Big house, small van”. Thus, whilst recognis<strong>in</strong>g that somerepeat offences may be committed by unrelated offenders, a consensus of op<strong>in</strong>ion isemerg<strong>in</strong>g that repeat victimisation is largely the work of the same offenders. A further f<strong>in</strong>d<strong>in</strong>gthat supports this conclusion and which has immediate <strong>crime</strong> prevention implications is the1


time course of repeat victimisation (RV). Research consistently demonstrates that when RVoccurs it does so swiftly offer<strong>in</strong>g a limited but precise w<strong>in</strong>dow of opportunity for <strong>in</strong>tervention(e.g. Polvi et al., 1991). Risk is unstable. Thus, repeat victimisation may be said to be aspecial case of space-time cluster<strong>in</strong>g, events tend<strong>in</strong>g to occur swiftly at the same locations.Inspired by the precepts of optimal forag<strong>in</strong>g theory, the authors have recently exam<strong>in</strong>edwhether RV is part of a more general forag<strong>in</strong>g pattern (Johnson and Bowers, 2004a). Thetheory, borrowed from behavioural ecology, is that when search<strong>in</strong>g for resources, offenderswill aim to limit the time spent search<strong>in</strong>g for suitable targets, whilst simultaneously seek<strong>in</strong>g tomaximise the rewards acquired thereby m<strong>in</strong>imis<strong>in</strong>g the associated risks. RV is arguably anexample of optimal forag<strong>in</strong>g. A conjecture from Farrell et al. (1995) illustrates this. Farrell etal. suggest that:“a burglar walk<strong>in</strong>g down a street where he has never burgled before sees two k<strong>in</strong>ds ofhouse – those presumed suitable and those presumed unsuitable. (The latteridentified by d<strong>in</strong>t of an alarm, by occupancy, the presence of a bark<strong>in</strong>g dog, and soon). He burgles one of the houses he presumes suitable, and he is successful. Nexttime he walks down the street, he sees three k<strong>in</strong>ds of house – the presumedunsuitable, the presumed suitable, and the known suitable. It would <strong>in</strong>volve the leasteffort to burgle the house known to be suitable.”Farrell et al. (1995)Thus, offenders target those properties with which they are most familiar, and which comb<strong>in</strong>egood rewards and acceptable risks. A natural extension of this strategy would be to target notonly those previously burgled and known to be suitable but also those houses that are mostsimilar to them, <strong>in</strong> terms of the likely risks and rewards and the effort <strong>in</strong>volved <strong>in</strong> burgl<strong>in</strong>gthem. The first law of geography states that th<strong>in</strong>gs which are closest to each other <strong>in</strong> spaceare the most similar. It follows that homes nearest to burgled houses may represent the nextbesttargets. For this reason, us<strong>in</strong>g data for the county of Merseyside and methodsdeveloped <strong>in</strong> the field of epidemiology (Knox, 1964), the authors conducted a series of studiesto exam<strong>in</strong>e whether the risk of burglary clusters <strong>in</strong> space and time more generally. That is,does the risk of burglary appear to be communicated from one property to another <strong>in</strong> muchthe same way as the behaviour of a disease? 1A series of confirmatory f<strong>in</strong>d<strong>in</strong>gs followed. In particular, for the area studied, the researchdemonstrated that the risk of burglary was communicated over a distance of about 400m andthis elevated risk endured for around one month (Johnson and Bowers, 2004a), after which itappeared to move to other nearby areas (Johnson and Bowers, 2004b). Additionally, adisproportionate <strong>in</strong>crease <strong>in</strong> risk for those on the same side of the street as the burgled homewas evident. The communicability of risk varied by area, with risk appear<strong>in</strong>g to be mostcommunicable <strong>in</strong> the most affluent of areas (Bowers and Johnson, 2005a), though somedegree of communicability was well-nigh universal.The practical implications of this programme of research are clear: <strong>crime</strong> reductive actionshould be directed towards the burgled home, and also to those nearby. However, oneconcern raised was the practicability of implement<strong>in</strong>g such a strategy on a large scale.Consider that the implementation of a strategy for which every burgled household andneighbours with<strong>in</strong> 400m received <strong>crime</strong> reduction attention would require substantialresources if implemented across an area such as a police Basic Command Unit. For obviousreasons, such a strategy is unlikely to generate much enthusiasm.What is required is a more precise method of generat<strong>in</strong>g reliably accurate predictions ofwhere <strong>crime</strong> will most likely next occur. Such a method should enable the efficientdeployment of resources. The rough location of a high concentration of <strong>crime</strong> could easily bepredicted by simply identify<strong>in</strong>g a large urban area, but this would be of little <strong>operational</strong> value.The challenge, then, is to identify where a high concentration of <strong>crime</strong> will occur for arelatively small area. Consider<strong>in</strong>g the f<strong>in</strong>d<strong>in</strong>gs <strong>in</strong> relation to <strong>crime</strong> concentration, for an1 The authors do not suggest that burglary exudes a bacillus but that the cluster<strong>in</strong>g of events <strong>in</strong> space and time mightsuggest that it does so.2


optimally calibrated system, the goal might be to be able to identify for each day or police shiftthe 20 per cent of locations <strong>in</strong> which 80 per cent of <strong>crime</strong> was most likely to occur. The extentto which this can be achieved will, of course, be affected by the degree to which <strong>crime</strong>concentrates <strong>in</strong> spatial and temporal terms, and the degree to which spatio-temporalsequences can be captured as maps.The key conceptual po<strong>in</strong>t <strong>in</strong> the enterprise is that past events are not themselves mapped <strong>in</strong>the conventional way, but contribute risks to locations over time and space to dim<strong>in</strong>ish<strong>in</strong>gextents. This approach has come to be known as prospective <strong>mapp<strong>in</strong>g</strong> (see Bowers et al.,2004; Johnson et al., 2005). The system uses recent historic <strong>crime</strong> data to generateforecasts which can be displayed us<strong>in</strong>g a Geographical Information System (GIS) andoverla<strong>in</strong> on an Ord<strong>in</strong>ance Survey (OS) map of the relevant polic<strong>in</strong>g area, allow<strong>in</strong>g <strong>crime</strong>reductive resources to be deployed to those areas when and where they will be most needed.The model is calibrated accord<strong>in</strong>g to the dimensions of the communicability of risk for thearea considered. Early evaluation of the system has shown that for the county of Merseysidethe locations of a large percentage of burglaries (64%-80%) (occurr<strong>in</strong>g up to three days afterthe generation of the forecasts) can be identified with<strong>in</strong> a small fraction of the total areaconsidered (20%). This level of accuracy outperformed exist<strong>in</strong>g methods of hotspot <strong>mapp<strong>in</strong>g</strong>(Bowers et al., 2004), which themselves outperformed predictions based on police officersperceptions of high risk areas (McLaughl<strong>in</strong> et al., forthcom<strong>in</strong>g), and the efficiency of aprediction slowly dim<strong>in</strong>ished after three days (Johnson et al., 2005) as was anticipated.Aims and objectivesThe results of the above studies show considerable promise for <strong>crime</strong> reduction. However,the external validity of the f<strong>in</strong>d<strong>in</strong>gs, that is to say how generalisable they are to other areasand different <strong>context</strong>s, rema<strong>in</strong>ed unknown. The ma<strong>in</strong> aims of the current project were sixfold.1. To see if the patterns of communicability discussed above are observed <strong>in</strong> anotherarea of the UK, namely the East Midlands.2. To see how this pattern varies between areas with<strong>in</strong> the East Midlands.3. To <strong>in</strong>vestigate how the police and their <strong>crime</strong> reduction partners currently deploy<strong>crime</strong> reduction resources, what they do and how they identify where to implementstrategies, as a basel<strong>in</strong>e aga<strong>in</strong>st which to consider the action implications ofpredictive <strong>mapp<strong>in</strong>g</strong>.4. Given that <strong>crime</strong> does cluster <strong>in</strong> space and time as observed on Merseyside, toevaluate the predictive accuracy of prospective <strong>mapp<strong>in</strong>g</strong> <strong>in</strong> these areas by compar<strong>in</strong>git with the systems currently used there, and aga<strong>in</strong>st what would be expected ifpatrols were directed to areas randomly5. To develop and field-test the system <strong>in</strong> one police BCU to explore its feasibility <strong>in</strong> an<strong>operational</strong> sett<strong>in</strong>g on a rout<strong>in</strong>e basis, and to identify obstacles to implementation.6. To evaluate the impact on <strong>crime</strong> of <strong>crime</strong> reduction strategies <strong>in</strong>formed by the system<strong>in</strong> the area.In the chapters that follow, the authors will discuss the results of the research and illustratehow the theory of prospective <strong>mapp<strong>in</strong>g</strong> (hereafter, Promap) evolved <strong>in</strong>to a tactical entity thatwas used <strong>in</strong> an <strong>operational</strong> <strong>context</strong>.3


2. Test<strong>in</strong>g the generalisability of prospective<strong>mapp<strong>in</strong>g</strong>As discussed above, research concerned with geographical hotspots of <strong>crime</strong> demonstratesthat over a given period of time <strong>crime</strong> is spatially concentrated (see, for example, Eck andWeisburd 1995). Other research (e.g. Farrell and Pease, 1994) demonstrates that with<strong>in</strong> aspecific geographical region, <strong>crime</strong> also exhibits temporal cluster<strong>in</strong>g, with <strong>in</strong>cidence rates<strong>in</strong>creas<strong>in</strong>g with the onset of the w<strong>in</strong>ter, and dim<strong>in</strong>ish<strong>in</strong>g around the spr<strong>in</strong>g. However, unlessthe risk of victimisation is communicable, one would expect these spatial and temporalclusters to be <strong>in</strong>dependent of each other, with the <strong>in</strong>cidence of new series of <strong>crime</strong> eventsfail<strong>in</strong>g to exhibit localised spatial and temporal <strong>in</strong>creases. Simply put, the communicability ofburglary risk may be demonstrated only by show<strong>in</strong>g that burglary clusters <strong>in</strong> both space andtime. Conformity to this pattern would be evident if houses near the burgled home werevictimised shortly afterwards more than would be expected on the basis of chance. Thosereaders not concerned with technical details on the demonstration of cluster<strong>in</strong>g should skip tothe beg<strong>in</strong>n<strong>in</strong>g of the next chapter at this po<strong>in</strong>t.Empirical research concerned with the space-time cluster<strong>in</strong>g of events was first conducted byKnox (1964) to study epidemics of leukaemia. The rationale underly<strong>in</strong>g the Knox test is todeterm<strong>in</strong>e whether there are more events that occur close <strong>in</strong> space and time than would beexpected on the basis of a random distribution. To do this, each event is compared with everyother and the distance and time between them recorded. For n cases, this generates ½n (n-1) pair<strong>in</strong>gs. A cont<strong>in</strong>gency table, such as shown <strong>in</strong> Table 2.1, with i columns and j rows isthen populated. The spatial and temporal <strong>in</strong>crements (or bandwidths) used <strong>in</strong> the rows andcolumns can be arbitrary, although they should be so def<strong>in</strong>ed as to allow specific hypotheses<strong>in</strong>formed by the underly<strong>in</strong>g theory to be tested. For <strong>in</strong>stance, <strong>in</strong> the case of <strong>crime</strong> the questionconcerns the distance over which <strong>crime</strong> has an impact and for how long? The bandwidthsselected should have relevance to <strong>operational</strong> polic<strong>in</strong>g.Table 2.1: Knox cont<strong>in</strong>gency table example1 month 2 months 3 months …………..100m n 11 n 21 n 31200m n 12 n 22 N 32300m n 13 n 23 N 33400mn 14 n 24 n 34……..……..Note: The mathematical notation n ij refers to the observed frequency for the cell occurr<strong>in</strong>g <strong>in</strong> column i and row j.Thus, n 11 refers to the cell <strong>in</strong> column 1, row 1.The cont<strong>in</strong>gency table generated can be compared with a chance distribution. Onecomplication is that the assumption of <strong>in</strong>dependence of observations, a criterion for most<strong>in</strong>ferential statistical methods, is violated. However, Knox suggested that <strong>in</strong> the absence of aspace-time <strong>in</strong>teraction, the statistical distribution of the expected values for the cells of thecont<strong>in</strong>gency table would conform to a Poisson distribution and could be computed <strong>in</strong> thesame way as a Chi-Square test, us<strong>in</strong>g the marg<strong>in</strong>al totals of the table. Thus,4


e ij = n .j x n i.nWhere, e ij is the expected value for each cell, n ij is the observed, and n i and nj are the row andcolumn totals respectivelyThe results of the analysis can be <strong>in</strong>terpreted by <strong>in</strong>spect<strong>in</strong>g adjusted residuals, computed foreach cell us<strong>in</strong>g the follow<strong>in</strong>g formula (see, Agresti, 1996, pp31-32):r ij =n ij – e ij[e ij (1-row proportion of n i+ )(1-column proportion of n +j )] 1/2Thus, the adjusted residuals are a measure of the difference between the observed andexpected values for each cell. The adjusted residuals have a mean value of zero and astandard deviation of one, hence adjusted residual scores exceed<strong>in</strong>g values of two (or evenmore str<strong>in</strong>gently three) are considered statistically significant. The null hypothesis is thatevents are not clustered <strong>in</strong> space and time. Negative values <strong>in</strong>dicated that there are fewerevents occurr<strong>in</strong>g with<strong>in</strong> a particular space-time <strong>in</strong>terval.The majority of research concerned with <strong>crime</strong> (Johnson and Bowers, 2004; Townsley et al.,2003) has used the Knox approximation to exam<strong>in</strong>e space-time cluster<strong>in</strong>g. However, analternative approach, for which the <strong>in</strong>dependence of observations is not a requirement, mayalso be computed (Johnson et al., 2006). This approach uses Monte-Carlo simulation togenerate an expected distribution, rather than us<strong>in</strong>g the marg<strong>in</strong>al totals (Besag and Diggle,1977). To do this, the data are permuted, <strong>in</strong> effect mix<strong>in</strong>g up the dates and locations acrossthe events. Thus, the dates are randomly shuffled us<strong>in</strong>g a pseudo-random number generator,whilst the spatial locations rema<strong>in</strong> fixed. The hypothesis is that if there is statisticallysignificant space-time cluster<strong>in</strong>g <strong>in</strong> the data then there should be more events observed tooccur close <strong>in</strong> space and time than for 95 per cent of the random permutations generated.The process of generat<strong>in</strong>g permutations is repeated (iterated) a number of times, typicallyaround 999, a new cont<strong>in</strong>gency table generated each time and compared with thecont<strong>in</strong>gency table for the observed distribution. The probability that the observed value foreach cell occurred on the basis of chance may be calculated us<strong>in</strong>g the follow<strong>in</strong>g formula (seeNorth, 2002):n − rank + 1p =n + 1Where n is the number of simulations, and rank is the position of the observed value <strong>in</strong> a rankordered array for that cellOne possible reservation about the p-values generated us<strong>in</strong>g the Monte-Carlo approach (andthe Knox residuals) is that they are not as readily <strong>in</strong>terpretable as one might like.Interpretation of the results can be aided by deriv<strong>in</strong>g a simple measure of effect size. 2 In thiscase, a Knox ratio, which contrasts the observed value for each cell with the average‘simulated’ value for that cell (or the expected value derived us<strong>in</strong>g the marg<strong>in</strong>al totals of thetable), was computed. Thus, a Knox ratio of 2.0 so derived would <strong>in</strong>dicate that twice as manyburglaries occurred with<strong>in</strong> a particular distance and time of each other than would on averagebe expected on the basis of a chance distribution. A value of one would <strong>in</strong>dicate that theresult conformed to what would be expected on the basis of chance, and values of less thanone that fewer burglaries occurred with<strong>in</strong> a particular distance and time of each other thanone would expect. Which measure of central tendency is best used to compute the odds ratiodepends upon the distribution of the simulated data. If the data are skewed, or there are2 The Knox residuals can be <strong>in</strong>terpreted <strong>in</strong> the same way to some extent but are not as simple to understand. Insimple terms, the larger the Knox residual the larger the effect.5


extreme values, the mean can misrepresent the distribution. For this reason, the authors useboth the mean and median values for each cell. On the whole, for the data analysed the twotypically converge and hence for the results that follow, the authors will <strong>report</strong> only resultsderived us<strong>in</strong>g the median values.This approach is to be preferred over the Knox approximation, particularly as no assumptionsregard<strong>in</strong>g the statistical distribution are required. However, limitations <strong>in</strong> comput<strong>in</strong>g powerhave meant that where a large number of events are to be analysed, the process can takesome time. This is particularly true where the dimensions of the cont<strong>in</strong>gency table or thenumber of events analysed are large. Fortunately, comput<strong>in</strong>g power is now sufficient forMonte-Carlo simulation of this k<strong>in</strong>d to be completed for small data sets (e.g. n=1000) and a 10x 10 cont<strong>in</strong>gency table fairly rapidly, and for larger data sets (e.g. n=2000) over an hour or so.Larger cont<strong>in</strong>gency tables or data sets can still take a matter of days, but are now easilycomputed by those prepared to be as patient as the present writers!Is the risk of burglary communicable <strong>in</strong> the East Midlands?In the sections that follow, the results for each polic<strong>in</strong>g area that was analysed <strong>in</strong> the EastMidlands, namely Mansfield and Ashfield Sectors <strong>in</strong> Nott<strong>in</strong>ghamshire, Alfreton (‘A’) Division <strong>in</strong>Derbyshire, and Corby and Well<strong>in</strong>gborough Sectors <strong>in</strong> Northamptonshire, will be presented.To allow easy direct comparisons the results will be presented here <strong>in</strong> tabular form. Anumber of analyses were conducted for each data set us<strong>in</strong>g both the Knox and Monte-Carlomethods described <strong>in</strong> the previous section. For <strong>in</strong>stance, analyses have been conductedus<strong>in</strong>g months as the temporal bandwidth whereas others have used weeks. For each areamonthly analyses will be presented for both Knox and Monte-Carlo approaches. As willbecome apparent these varied little. Thus, analyses for the Knox approximation only will bepresented look<strong>in</strong>g at the communication of risk over weekly <strong>in</strong>tervals. In all analyses, for thesake of simplicity, repeat victimisation is excluded. Thus, the results consider the distanceover which the risk of a household’s burglary is communicated to different households and forhow long this endures. Because of the exclusion of repeats aga<strong>in</strong>st the same household, thebenefits of patroll<strong>in</strong>g and resourc<strong>in</strong>g patterns based upon prop<strong>in</strong>quity <strong>in</strong> time and space to aburgled home will be considerably understated <strong>in</strong> what follows.To anticipate the results, it would appear that as a general rule the risk of burglary iscommunicable up to a distance of around 400m for at least one month. There was no area forwhich this was not the case, hence universal application of the 400m one-month rule is <strong>in</strong> nocase <strong>in</strong>appropriate, it merely excludes a proportion of other high-risk homes. The sensitivityanalyses conducted to exam<strong>in</strong>e the duration of the elevation <strong>in</strong> risk suggested that thisextended beyond one month <strong>in</strong> most cases, up to around eight weeks. This will subsequentlybe referred to as the classic profile. Those not wish<strong>in</strong>g to understand the detail of areadifferences should skip to the next section, <strong>in</strong> which the value of prospective <strong>mapp<strong>in</strong>g</strong> <strong>in</strong><strong>operational</strong> <strong>context</strong> is explored.Mansfield Police SectorFor Mansfield, the data analysed cover the period January-December 2004 and comprised1,156 burglary events. The results of the monthly Knox and Monte-Carlo analyses are shownas Tables 2.2 and 3.2 respectively. The results are consistent <strong>in</strong> show<strong>in</strong>g that the risk ofburglary communicates up to a distance of 200m and endures for one month. Additionally,the Monte-Carlo results suggest that for houses with<strong>in</strong> 100m of burgled homes the riskendures for up to two months. The same (two-month) result is apparent for the Knox residualanalysis, although it marg<strong>in</strong>ally fails to be statistically reliable.6


Table 2.2: Knox ratios for Mansfield (values <strong>in</strong> bold are statistically significantaccord<strong>in</strong>g to the residual scores (not shown), N=1,566)MONTHS1 2 3 4 5 6100 1.26 1.10 0.97 0.85 1.02 1.03200 1.08 0.99 0.93 1.04 0.92 1.01300 1.00 1.07 1.01 1.01 1.01 1.13400 1.03 0.96 1.07 1.04 1.01 1.06500 1.01 1.06 0.97 0.98 1.11 1.05600 1.03 1.02 0.98 1.08 0.98 1.03700 1.03 1.04 0.96 1.00 1.01 1.02800 1.04 1.01 0.97 0.98 1.00 1.00900 1.03 1.06 0.97 0.96 0.98 1.031000 1.06 1.01 0.96 1.02 0.99 1.02A number of other cells are statistically significant <strong>in</strong> each table, namely those for 1,000m andone-month and 500m and five months. Due to the results for a large number of cells be<strong>in</strong>ganalysed, some cells (60*0.05=3) will have significant values by chance. For this reason theywill be discussed no further. In contrast, the analyses for the cells <strong>in</strong> the top left of the tablesare based on an a priori hypothesis and are of clear relevance.Visual <strong>in</strong>spection of the Knox ratios <strong>in</strong> Table 2.3, shows that around 25 per cent moreburglaries occur with<strong>in</strong> 100m and one month of burgled homes than would be expected onthe basis of chance, eight per cent more between 101-200m. 12 per cent more up to 100mand between 30-60 days. Otherwise, the number of burglaries approximate what would beexpected on the basis of chance. (Note that the Knox residuals cannot be <strong>in</strong>terpreted aspercentage deviations from chance as they are actually z-scores, see preced<strong>in</strong>g section).Table 2.3: Monte-Carlo results for Mansfield (values <strong>in</strong> bold are statistically significant,N=1566)MONTHS1 2 3 4 5 6100 1.26 1.12 0.92 0.90 0.99 1.08200 1.08 0.99 0.93 1.02 0.95 0.99300 1.00 1.06 1.00 1.01 1.00 1.17400 1.03 0.98 1.08 1.03 1.00 1.03500 1.01 1.05 0.96 1.00 1.10 1.06600 1.03 1.02 0.97 1.09 0.97 1.03700 1.03 1.04 0.94 1.02 1.00 1.01800 1.04 1.01 0.99 0.96 1.01 0.98900 1.03 1.05 0.96 0.98 0.98 1.001000 1.06 1.00 0.97 1.01 1.00 1.03To <strong>in</strong>crease the sensitivity of the results, an additional Knox analysis was conducted toexam<strong>in</strong>e the temporal pattern <strong>in</strong> more detail. Thus, weekly rather than monthly patterns wereanalysed. As noted above, these were computed us<strong>in</strong>g the Knox approximation rather thanMonte-Carlo simulation.7


Table 2.4: Weekly Knox ratios for Mansfield (values <strong>in</strong> bold are statistically significantaccord<strong>in</strong>g to the residual scores (not shown), N=1566)WEEKS1 2 3 4 5 6 7 8 9 10 11 12100 1.43 1.29 1.31 1.23 1.21 1.20 1.17 1.14 1.13 1.06 1.03 0.98200 1.38 1.20 1.14 1.09 0.99 0.94 0.94 0.95 0.98 1.01 0.99 0.96300 1.09 1.04 1.00 1.00 1.01 1.04 1.06 1.09 1.05 1.03 1.05 1.00400 1.07 1.06 1.02 1.04 1.00 0.99 0.98 0.94 0.97 1.01 1.06 1.05500 0.97 0.98 1.00 1.01 1.01 1.05 1.05 1.08 1.06 1.03 1.00 0.95600 1.03 1.10 1.06 1.04 1.03 0.99 0.99 1.00 1.03 1.01 1.02 1.01700 0.99 1.01 0.99 1.02 1.03 1.04 1.04 1.03 1.05 1.04 1.03 1.00800 1.04 1.02 1.03 1.05 1.04 1.03 1.03 1.00 1.02 1.01 1.00 0.98900 1.02 1.02 1.06 1.04 1.04 1.05 1.02 1.04 1.05 1.03 1.03 1.001000 1.10 1.09 1.07 1.07 1.04 1.00 1.00 0.98 1.02 1.00 0.99 0.99The results, shown as Table 2.4, suggest that the risks for houses with<strong>in</strong> 100m of a burgledhome endure for up to n<strong>in</strong>e weeks, and for those with<strong>in</strong> 200m four weeks. Thus, the resultsof the monthly and weekly analysis reveal essentially the same pattern.Well<strong>in</strong>gborough Police SectorFor Well<strong>in</strong>gborough, the data cover the period for which the most recent data were availableat the time of analysis, <strong>in</strong> this case January-December 2003. There were 1,350 burglariesover this period. Tables 2.5 and 2.6 show the Knox and Monte-Carlo analyses. A similarpattern emerges. The results suggest an elevated risk to those proximate to the burgled homefor around one month.Table 2.5: Knox ratios for Well<strong>in</strong>gborough (values <strong>in</strong> bold are statistically significantaccord<strong>in</strong>g to the residual scores (not shown), N=1350)MONTHS1 2 3 4 5 6100 1.63 1.04 0.70 0.82 0.96 0.64200 1.37 1.00 0.85 0.78 0.89 0.85300 1.27 0.96 0.90 0.82 0.89 0.93400 1.20 0.98 0.96 0.94 0.93 0.89500 1.17 1.03 0.94 1.01 0.92 0.93600 1.10 1.04 1.00 0.92 0.93 0.87700 1.01 1.05 0.99 0.96 0.94 0.93800 1.08 0.98 1.03 1.02 0.98 0.91900 1.01 0.97 0.95 0.95 1.02 0.951000 0.99 1.00 1.04 0.98 0.93 1.05The results of the Monte Carlo analysis show that 57 per cent more burglaries occurred with<strong>in</strong>100m and one month of each other than would be expected on the basis of chance. A largenumber of burglaries also occur up to 400m and one month of each other, thereafter the Knoxratios dim<strong>in</strong>ish although they rema<strong>in</strong> statistically significant up to 700m.To exam<strong>in</strong>e the pattern <strong>in</strong> more detail, a weekly analysis was conducted. The results, shownas Table 2.7, suggest a similar pattern but that the elevated risks endure for more than onemonth.8


Table 2.6: Monte-Carlo results for Well<strong>in</strong>gborough (values <strong>in</strong> bold are statisticallysignificant, N=1350)MONTHS1 2 3 4 5 6100 1.57 0.97 0.77 0.82 1.00 0.72200 1.35 1.01 0.85 0.77 0.91 0.86300 1.26 0.96 0.90 0.81 0.90 0.93400 1.21 0.99 0.96 0.91 0.91 0.92500 1.16 1.03 0.93 1.00 0.94 0.95600 1.10 1.03 1.00 0.93 0.92 0.86700 1.01 1.05 0.98 0.98 0.95 0.91800 1.08 0.98 1.03 1.02 0.99 0.89900 1.01 0.98 0.95 0.96 0.99 0.941000 0.98 1.01 1.04 0.98 0.92 1.05These f<strong>in</strong>d<strong>in</strong>gs illustrate a problem with analyses where a certa<strong>in</strong> level of aggregation isemployed. This is known as Simpson’s paradox (Simpson, 1969). This occurs where dataaggregated up to a fairly large unit of analysis such as one month, mask subtle trendsapparent where data disaggregated to a f<strong>in</strong>er level of resolution (such as one week) are used.In this case, it would appear from the analysis shown <strong>in</strong> Table 2.7 that the risk to houses up to600m from victimised homes endures for around six to seven weeks rather than four. In anyevent, it is apparent that the risks are consistently greater with<strong>in</strong> the first month.Table 2.7: Weekly Knox ratios for Well<strong>in</strong>gborough (values <strong>in</strong> bold are statisticallysignificant accord<strong>in</strong>g to the residual scores (not shown), N=1350)WEEKS1 2 3 4 5 6 7 8 9 10 11 12100 1.82 1.78 1.76 1.67 1.53 1.39 1.22 1.06 0.97 0.87 0.78 0.76200 1.64 1.56 1.46 1.39 1.27 1.18 1.09 1.03 1.00 0.96 0.89 0.86300 1.52 1.43 1.37 1.29 1.20 1.12 1.04 1.00 0.94 0.91 0.88 0.88400 1.39 1.28 1.23 1.21 1.15 1.09 1.04 0.99 0.95 0.94 0.96 0.95500 1.27 1.23 1.19 1.18 1.13 1.11 1.06 1.04 1.01 0.98 0.97 0.95600 1.11 1.08 1.09 1.11 1.08 1.08 1.06 1.05 1.03 1.03 1.02 1.01700 1.02 1.01 1.02 1.00 1.02 1.04 1.06 1.06 1.04 1.01 1.00 1.00800 1.16 1.08 1.10 1.07 1.05 1.04 1.02 1.00 0.99 1.00 1.00 1.03900 1.04 1.03 1.01 1.01 1.01 0.99 0.98 0.97 0.98 0.98 0.98 0.981000 1.00 1.01 1.01 0.99 0.97 0.97 0.96 1.00 1.01 1.01 1.04 1.04Ashfield Police SectorFor Ashfield, the data cover the period January-December 2004 and a total of 1,012 burglaryevents. The results of the monthly Knox and Monte-Carlo analyses are shown as Tables 2.8and 2.9 respectively.9


Table 2.8: Knox ratios for Ashfield (values <strong>in</strong> bold are statistically significantaccord<strong>in</strong>g to the residual scores (not shown), N=1012)MONTHS1 2 3 4 5 6100 1.19 0.96 1.04 1.04 0.96 0.79200 1.17 0.99 0.94 0.97 1.00 0.91300 1.18 0.96 0.99 0.99 0.95 1.00400 1.11 0.96 0.96 1.11 0.94 1.01500 1.02 1.03 0.99 1.05 0.96 1.00600 1.09 1.04 1.01 1.07 0.97 0.98700 1.12 0.96 1.07 1.05 0.91 0.89800 0.99 1.01 1.02 0.98 0.96 1.06900 0.96 0.96 1.08 0.96 1.05 0.981000 0.97 1.02 1.02 1.01 1.06 0.92The results are aga<strong>in</strong> very consistent. Both analyses suggest that the risk of burglarycommunicates over a distance of up to 700m and endures for one month. Interest<strong>in</strong>gly, therisk communicated to houses with<strong>in</strong> 401-500m appears to be non-significant. This is difficultto expla<strong>in</strong>. It could be an expression of the spatial distribution of targets across the area, orperhaps suggests the existence of a natural boundary that generates this pattern bydiscourag<strong>in</strong>g some offenders from travell<strong>in</strong>g from one area to a second nearby. Moreresearch would be required to understand this effect. Nevertheless, the results clearlydemonstrate that the risk of burglary is communicable.Table 2.9: Monte-Carlo results for Ashfield (values <strong>in</strong> bold are statistically significant,N=1012)MONTHS1 2 3 4 5 6100 1.18 0.96 1.03 1.05 0.96 0.80200 1.17 0.98 0.95 0.97 1.00 0.92300 1.17 0.97 0.98 0.99 0.94 1.01400 1.11 0.95 0.97 1.11 0.95 1.00500 1.02 1.03 0.98 1.05 0.96 0.98600 1.08 1.04 1.01 1.07 0.98 0.97700 1.12 0.96 1.07 1.06 0.90 0.90800 0.99 1.00 1.03 0.97 0.96 1.06900 0.96 0.96 1.08 0.94 1.07 0.981000 0.97 1.01 1.03 1.02 1.07 0.92As before, an additional Knox analysis was conducted to exam<strong>in</strong>e the temporal trend <strong>in</strong> moredetail. The results, shown as Table 2.10, suggest a similar pattern of risk, but additionallysuggest that houses between 401-500m of burgled homes are at an elevated (albeitmarg<strong>in</strong>ally non-significant) risk of victimisation for up to two weeks after an <strong>in</strong>itial burglary.Thus, this suggests that the risk of victimisation is, <strong>in</strong> general, communicable up to 700m, butfor slightly different time periods.10


Table 2.10: Weekly Knox ratios for Ashfield (values <strong>in</strong> bold are statistically significantaccord<strong>in</strong>g to the residual scores (not shown), N=1012)WEEKS1 2 3 4 5 6 7 8 9 10 11 12100 1.61 1.44 1.28 1.22 1.06 1.02 0.96 0.96 0.96 0.97 0.97 0.97200 1.46 1.29 1.25 1.18 1.08 1.00 0.99 0.99 0.98 1.01 0.94 0.93300 1.43 1.39 1.23 1.17 1.08 1.05 0.99 0.98 0.94 0.97 0.95 1.00400 1.20 1.16 1.15 1.12 1.08 1.06 1.00 0.96 0.96 0.95 0.95 0.98500 1.13 1.10 1.05 1.03 1.00 0.99 0.97 1.01 1.02 0.96 0.97 0.96600 1.20 1.16 1.13 1.09 1.07 1.05 1.01 1.04 1.04 1.04 1.04 1.05700 1.35 1.20 1.16 1.13 1.06 1.02 1.01 0.96 0.96 0.99 1.01 1.04800 1.06 1.03 1.04 1.00 0.98 0.96 0.97 0.97 0.98 1.01 1.02 1.05900 0.96 0.98 0.97 0.97 0.96 0.91 0.90 0.94 0.96 1.00 1.08 1.121000 0.93 0.96 0.97 0.96 0.99 0.99 1.00 1.03 1.03 1.06 1.03 1.06Corby Police SectorFor Corby, the most recent data available at the time of analysis covered the period January-December 2003. There were only 429 burglaries for this period <strong>in</strong> Corby. The results, shownas Tables 2.11 and 2.12, are aga<strong>in</strong> very consistent. Unlike the above analyses, while moreburglaries occur with<strong>in</strong> 100m and one month of each other than would be expected on thebasis of chance, the difference is not statistically reliable. However, this may be due to thelow sample size (e.g. the expected cell count for that cell was five times lower than the samecell for Mansfield), particularly for that cell, rather than reflect<strong>in</strong>g an irregularity <strong>in</strong> the patternof the communicability of risk. As with the analyses for Mansfield the analyses suggest thatthe risk of burglary communicates over a distance of up to 700m and endures for one month,although houses with<strong>in</strong> 401-500m appear not to be at significantly heightened risk.Table 2.11: Knox ratios for Corby (values <strong>in</strong> bold are statistically significant accord<strong>in</strong>gto the residual scores (not shown), N=429)MONTHS1 2 3 4 5 6100 1.17 1.07 1.11 1.02 1.06 0.87200 1.20 0.99 1.22 1.02 0.89 0.96300 1.13 0.94 0.90 1.12 0.96 0.92400 1.22 1.01 1.02 1.05 1.10 0.96500 1.04 1.04 1.02 1.09 1.09 1.03600 1.11 1.08 1.11 1.02 1.02 1.02700 1.12 1.01 1.11 0.91 0.98 1.03800 1.02 1.06 1.07 0.98 1.13 1.06900 1.02 1.04 1.05 1.03 0.93 1.111000 1.10 0.91 1.09 1.03 1.06 1.06As with the results for Mansfield, the Monte-Carlo analysis suggests that around 20 per centmore burglaries occurred with<strong>in</strong> 101-200m and one month of a burgled home. Alsoconsistent with the f<strong>in</strong>d<strong>in</strong>gs for Mansfield, the risk to houses with<strong>in</strong> 401-500m of burgledproperties appears to be elevated yet non-significant.For completeness, an additional Knox analysis was conducted to exam<strong>in</strong>e the temporal trend<strong>in</strong> more detail. However, as this analysis generated a larger number of cells than the monthlyanalysis and there was such a low volume of <strong>crime</strong> for this area, the results were consideredunreliable and will not be discussed further. Because of the essential similarity of the data11


across areas it is thought likely that the same patterns underlie the Corby data, andapplication of predictive <strong>mapp<strong>in</strong>g</strong> <strong>in</strong> low <strong>crime</strong> areas is by no means regarded as unprofitable.Table 2.12: Monte-Carlo results for Corby (values <strong>in</strong> bold are statistically significant,N=429)MONTHS1 2 3 4 5 6100 1.18 1.02 1.12 1.02 1.09 0.87200 1.20 0.96 1.23 1.03 0.88 0.96300 1.13 0.93 0.86 1.16 0.91 0.96400 1.22 1.03 1.04 1.07 1.09 0.96500 1.04 1.04 1.04 1.07 1.05 1.10600 1.11 1.12 1.08 1.01 1.04 1.00700 1.12 1.03 1.07 0.93 0.99 1.03800 1.02 1.07 1.06 1.02 1.14 1.07900 1.03 1.07 1.08 1.02 0.97 1.101000 1.09 0.92 1.09 1.04 1.06 1.06Alfreton ‘A’ DivisionFor ‘A’ Division <strong>in</strong> Derbyshire, the period for which the most recent data were available at thetime of analysis was April 2003-March 2004. There were 1,703 burglaries dur<strong>in</strong>g this period.More recent data are now available but were not used for the analyses <strong>in</strong> this section of the<strong>report</strong>. Tables 2.13 and 2.14 show the Knox and Monte-Carlo analyses. A similar patternemerges to those presented above, although the risk appears to communicate over a greaterdistance than for the other areas. Thus, the results suggest an elevated risk to those up to900m from burgled homes for around one month.Table 2.13: Knox ratios for ‘A’ Division (values <strong>in</strong> bold are statistically significantaccord<strong>in</strong>g to the residual scores (not shown), N=1703)MONTHS1 2 3 4 5 6100 1.37 0.93 0.91 0.93 0.85 0.76200 1.29 0.93 0.91 0.93 0.93 0.96300 1.19 1.00 0.94 0.94 0.83 0.90400 1.17 0.97 0.99 0.94 0.85 0.91500 1.08 0.95 0.91 0.98 0.85 1.02600 1.09 1.02 0.95 0.95 0.89 0.95700 1.07 1.00 0.95 0.95 0.88 1.07800 1.06 1.02 0.94 0.98 0.98 0.95900 1.16 1.03 0.97 0.91 0.93 0.891000 1.04 1.03 0.99 1.01 0.86 0.94As with the other analyses, the Knox ratios shown <strong>in</strong> Table 13.2 demonstrate a pattern ofdistance decay. That is, the risk of burglary is greatest nearest to burgled homes, after whichit rema<strong>in</strong>s elevated but clearly dim<strong>in</strong>ishes. Expressed <strong>in</strong> a slightly different way, just under 40per cent more burglaries occurred with<strong>in</strong> 100m and one month of each other than would beexpected on the basis of chance. This is the highest concentration observed for that cellacross the data sets analysed. In contrast, around eight per cent more burglaries occurredbetween 400-800m and one month of each other than would be expected.12


Table 2.14: Monte-Carlo results for ‘A’ Division (values <strong>in</strong> bold are statisticallysignificant, N=1703)MONTHS1 2 3 4 5 6100 1.36 0.93 0.93 0.94 0.85 0.79200 1.27 0.95 0.91 0.93 0.93 0.93300 1.20 0.99 0.95 0.95 0.82 0.90400 1.18 0.96 0.98 0.93 0.85 0.95500 1.08 0.96 0.93 0.95 0.86 1.02600 1.08 1.01 0.97 0.95 0.88 0.99700 1.08 0.97 0.96 0.94 0.88 1.04800 1.06 1.01 0.95 0.98 0.98 0.96900 1.16 1.03 0.97 0.92 0.92 0.891000 1.04 1.05 0.96 1.02 0.86 0.92To exam<strong>in</strong>e the pattern <strong>in</strong> more detail, a weekly analysis was conducted. The results, shownas Table 2.15, suggest a similar pattern but that aga<strong>in</strong> the elevated risks endure for more thanone month <strong>in</strong> some cases (e.g. 101-200m), less <strong>in</strong> others (e.g. 601-700m).Table 2.15: Weekly Knox ratios for ‘A’ Division (values <strong>in</strong> bold are statisticallysignificant accord<strong>in</strong>g to the residual scores (not shown), N=1703)WEEKS1 2 3 4 5 6 7 8 9 10 11 12100 2.38 1.77 1.54 1.40 1.08 0.97 0.96 0.96 0.96 0.90 0.92 0.85200 1.63 1.41 1.38 1.30 1.15 1.10 0.99 0.98 0.96 0.96 0.94 0.92300 1.38 1.35 1.24 1.21 1.11 1.05 1.02 0.99 0.97 0.97 0.99 0.96400 1.26 1.22 1.21 1.18 1.16 1.11 1.06 0.97 0.94 0.91 0.93 0.95500 1.05 1.10 1.08 1.07 1.04 1.03 1.00 0.97 0.96 0.94 0.93 0.91600 1.14 1.13 1.09 1.08 1.04 1.02 1.03 1.01 1.03 1.02 0.97 0.98700 1.18 1.09 1.06 1.06 1.04 1.06 1.05 1.00 0.98 0.94 0.93 0.95800 1.15 1.11 1.08 1.06 1.02 1.02 1.03 1.04 1.03 0.97 0.93 0.94900 1.21 1.20 1.17 1.16 1.12 1.10 1.10 1.09 1.05 1.00 0.99 0.951000 1.20 1.05 1.04 1.03 1.02 1.04 1.04 1.05 1.04 1.03 1.03 0.99Summary of the patterns so farThe above results demonstrate that for all areas analysed, there was clear evidence that therisk of burglary is communicable, although the distances over which this occurred varied byarea. In relation to the time over which this elevated risk endured, this tended to be at leastone month, but <strong>in</strong> some cases extended over longer <strong>in</strong>tervals. One way of summaris<strong>in</strong>g thepatterns observed is presented as Table 2.16. Each cell of the table is shaded to <strong>in</strong>dicate forhow many areas the particular cell had an over-representation of burglary pairs. This allows aquick comparison to see for how many areas the risk of burglary communicated up to say100m and one month, 201-300m and two months, and so on. It is clear that the mostcommon pattern was for the risk of burglary to extend up to 400m and for one month,although for some areas the risk communicated over greater distances, even up to 1,000m.Consider<strong>in</strong>g the unexpla<strong>in</strong>ed results that were not anticipated by the theory (e.g. 200m andthree months for Corby), it is clear that there was no regularity <strong>in</strong> these results, suggest<strong>in</strong>gthat they probably reflect spurious correlations or statistical artefacts.Each cell also conta<strong>in</strong>s the average Knox ratio for that cell, calculated across the five datasets. Not surpris<strong>in</strong>gly the results correlate with the colour cod<strong>in</strong>g, with those cells shaded <strong>in</strong>13


the darkest colours hav<strong>in</strong>g the highest values. It is also apparent that <strong>in</strong> general there is apattern of distance decay, such that the highest Knox ratios are for the shortest spatial<strong>in</strong>tervals.Table 2.16: Summary or the analyses concerned with the communicability of risk (cellvalues are Knox ratios generated us<strong>in</strong>g Monte-Carlo simulation)MONTHS1 2 3 4 5 6100 1.26 1.00 1.01 0.99 0.97 0.87200 1.20 0.97 0.99 0.98 0.95 0.94300 1.17 0.98 0.95 1.02 0.92 1.01400 1.18 0.97 1.01 1.05 0.97 0.99500 1.04 1.02 0.98 1.02 0.99 1.03600 1.08 1.05 1.01 1.04 0.97 0.99700 1.08 0.99 1.02 1.00 0.93 0.98800 1.04 1.02 1.01 0.98 1.01 1.03900 1.03 1.01 1.03 0.96 1.00 0.991000 1.04 1.00 1.02 1.02 1.01 0.97Key 4-5 2-3 0-1Thus, it would appear that as a general rule the risk of burglary is communicable up to adistance of around 400m for at least one month. There was no area for which this was not thecase, hence universal application of a 400 metres one month rule is <strong>in</strong> no case <strong>in</strong>appropriate,merely that it excludes a proportion of other high-risk homes. The sensitivity analysesconducted to exam<strong>in</strong>e the duration of the elevation <strong>in</strong> risk suggested that this extendedbeyond one month <strong>in</strong> most cases, up to around eight weeks. This will subsequently bereferred to this as the classic profile.Spatial variation?Compared to the other areas considered, ‘A’ Division covers a large geographic area, thisbe<strong>in</strong>g approximately 150 square miles. For this reason, additional analyses were conductedfor areas nested with<strong>in</strong> the BCU. In so do<strong>in</strong>g, the analyses control for another example ofSimpson’s paradox (Simpson, 1969), commonly referred to as the Modifiable Areal UnitProblem with<strong>in</strong> the research literature (e.g. Openshaw, 1995). In this case, the problem isthat it is possible, even likely, that patterns evident at the aggregate level (i.e. across all fiveareas) differ from those that would be apparent at the local level. Thus, further analyses wereconducted to exam<strong>in</strong>e the patterns at the local level for five smaller areas with<strong>in</strong> ‘A’ Division.To do this, analyses were conducted for each of the five polic<strong>in</strong>g sections with<strong>in</strong> ‘A’ Division.However, one problem with conduct<strong>in</strong>g such analysis is that the geographical polic<strong>in</strong>gboundaries used are usually artificial and hence if the data are analysed for one area at atime us<strong>in</strong>g the exist<strong>in</strong>g boundaries, this can create what is known as an edge effect. Theproblem that arises is that patterns which occur across and around the boundary can rema<strong>in</strong>undetected. Where boundaries are def<strong>in</strong>ed by natural features such as rivers or othertopological barriers this of course is not a problem.To reduce the likelihood of encounter<strong>in</strong>g this problem, a 1km buffer was generated aroundeach area and the data with<strong>in</strong> the larger area analysed. In this way, any patterns of offend<strong>in</strong>gat the edges of the polic<strong>in</strong>g boundaries should be detected. The five different polic<strong>in</strong>g areasand the buffer zones used are shown <strong>in</strong> Figure 2.1.14


Figure 2.1: The five polic<strong>in</strong>g areas <strong>in</strong> ‘A’ Division (right panel shows the buffer zoneused <strong>in</strong> the analyses)The results of the analysis for each area are shown <strong>in</strong> Tables 2.17-2.21. For area 1, it wouldappear that the risk of burglary communicates up to around 400m and particularly for oneweek after an <strong>in</strong>itial event. This is clearly different to the ‘A’ Division wide analyses presentedabove. It is also apparent that many more burglaries occur with<strong>in</strong> 100m and one week ofeach other than would be expected if there were no communication of burglary risk.Table 2.17: Weekly Knox analysis for area 1 (values <strong>in</strong> bold are statistically significantaccord<strong>in</strong>g to the residual scores (not shown), N=409)WEEKS1.00 2.00 3.00 4.00 5.00 6.00 7.00 8.00 9.00 10.00 11.00 12.00100 2.71 0.86 1.14 0.86 0.68 0.86 1.07 1.23 0.59 0.89 1.12 1.08200 1.65 1.22 0.91 0.89 1.00 1.23 1.16 1.03 1.05 0.94 1.31 1.00300 1.44 1.17 1.14 1.22 1.09 0.84 1.00 1.01 1.02 0.77 1.13 1.10400 1.32 1.16 1.04 1.15 1.21 1.00 0.89 1.05 0.89 0.79 1.09 0.94500 0.98 1.17 1.17 0.91 1.10 1.07 0.92 0.97 1.28 1.14 0.85 0.93600 1.22 1.00 0.92 0.99 1.02 1.18 0.79 1.04 1.00 1.02 1.05 1.08700 1.09 0.97 0.97 0.97 1.10 1.13 1.04 0.93 0.96 0.98 0.98 1.08800 1.17 1.10 0.99 1.08 1.06 1.07 1.24 1.07 0.82 0.83 0.90 0.96900 1.00 0.96 1.04 1.06 1.07 1.14 0.99 0.93 1.24 0.96 0.80 0.801000 0.94 1.01 1.00 1.17 0.92 0.91 1.09 0.91 1.15 1.07 0.90 0.90The results for area 2, shown <strong>in</strong> Table 2.18, reveal a similar pattern of results, although thepattern of distance decay is less dramatic than for area 1.15


Table 2.18: Weekly Knox analysis for area 2 (values <strong>in</strong> bold are statistically significantaccord<strong>in</strong>g to the residual scores (not shown), N=270)WEEKS1.00 2.00 3.00 4.00 5.00 6.00 7.00 8.00 9.00 10.00 11.00 12.00100 1.90 1.29 0.70 0.75 1.16 0.89 1.00 1.26 0.83 1.00 0.72 1.18200 1.49 1.26 1.15 0.91 0.77 0.66 1.14 1.05 0.95 0.95 0.71 0.88300 1.38 1.11 0.86 0.84 0.85 0.82 1.24 1.15 1.00 1.18 1.19 0.81400 1.22 1.18 1.09 0.88 1.06 1.06 1.04 0.96 0.92 0.80 0.79 1.16500 1.02 0.99 0.88 0.93 1.03 1.05 0.90 1.01 0.93 0.91 0.99 0.93600 1.31 0.96 1.00 1.09 0.89 0.90 0.88 0.92 0.79 0.99 0.79 1.08700 1.12 0.99 0.87 0.74 1.02 1.05 1.06 0.82 0.90 0.98 1.01 0.94800 1.12 1.15 0.81 1.04 1.02 1.02 0.99 1.15 1.01 0.95 0.94 1.09900 1.03 1.17 0.98 1.10 0.98 0.93 0.99 1.12 0.95 0.87 1.06 0.911000 1.11 0.96 1.01 0.88 1.15 1.11 0.99 1.07 0.86 1.10 0.99 0.98For area 3, the results are somewhat different, suggest<strong>in</strong>g that <strong>in</strong> this area the risk of burglarycommunicates over longer distances and endures a little longer.Table 2.19: Weekly Knox analysis for area 3 (values <strong>in</strong> bold are statistically significantaccord<strong>in</strong>g to the residual scores (not shown), N=357)WEEKS1.00 2.00 3.00 4.00 5.00 6.00 7.00 8.00 9.00 10.00 11.00 12.00100 2.20 1.26 1.45 1.14 1.03 1.09 1.03 1.03 1.03 1.06 1.26 0.88200 1.61 1.33 1.39 1.07 1.04 0.99 0.83 0.97 0.75 0.97 0.86 0.72300 1.42 1.51 1.04 1.01 1.17 1.00 0.96 1.03 0.75 0.85 1.02 0.81400 1.33 1.13 1.17 1.03 1.07 1.02 1.07 1.04 1.01 0.86 0.94 0.91500 1.04 1.22 1.02 1.11 0.94 0.89 0.79 0.91 0.92 0.88 0.89 0.93600 1.16 1.17 1.09 1.01 0.88 1.02 0.99 0.94 0.96 1.01 0.82 1.09700 1.13 1.06 0.81 1.05 1.04 0.97 1.00 0.90 1.04 1.01 0.87 0.92800 1.14 1.09 0.97 0.92 0.91 1.09 1.01 0.90 1.01 0.72 0.99 0.89900 1.19 1.06 1.13 1.07 0.95 1.10 0.93 0.98 0.99 1.00 1.00 1.021000 1.17 0.92 1.08 0.91 1.01 0.88 1.03 1.06 1.00 0.93 0.96 0.96For area 4, there appears to be a more classic effect, with the communication of risk be<strong>in</strong>g up toaround 400m and for up to three weeks. Aga<strong>in</strong>, the risk to those closest to burgled homes is strik<strong>in</strong>g.Table 2.20; Weekly Knox analysis for area 4 (values <strong>in</strong> bold are statistically significantaccord<strong>in</strong>g to the residual scores (not shown), N=407)WEEKS1.00 2.00 3.00 4.00 5.00 6.00 7.00 8.00 9.00 10.00 11.00 12.00100 2.12 1.61 1.29 1.00 0.81 1.08 1.38 1.00 1.16 0.84 1.17 1.00200 1.36 1.10 1.36 1.13 1.31 1.08 1.03 0.95 1.04 1.00 0.85 0.87300 1.30 1.18 1.03 1.15 1.14 1.10 1.04 1.13 1.05 1.12 1.05 1.08400 1.22 1.04 1.23 1.13 1.12 1.23 1.15 0.85 0.90 1.05 1.21 1.16500 1.03 1.03 1.03 1.10 0.98 1.12 1.16 1.10 0.98 0.92 0.91 0.87600 1.01 1.01 1.17 1.00 1.05 1.02 1.10 1.14 1.04 0.98 0.84 1.05700 1.07 1.15 1.19 1.08 1.17 1.05 0.98 0.97 1.13 1.04 0.91 0.91800 1.16 1.07 1.06 1.05 0.97 1.07 0.96 1.04 1.06 0.97 0.96 0.98900 1.14 1.21 1.05 1.10 1.28 1.10 1.01 0.86 0.91 0.94 1.12 0.991000 1.11 0.95 0.95 1.01 1.14 1.08 1.03 0.93 1.09 0.97 1.03 0.8616


The results for area 5 aga<strong>in</strong> demonstrate that the apparent risk to houses near to the burgledhome is particularly dramatic. However, <strong>in</strong> common with area 3 the risk of burglary appearsto communicate over a greater distance <strong>in</strong> this area.Table 2.21: Weekly Knox analysis for area 5 (values <strong>in</strong> bold are statistically significantaccord<strong>in</strong>g to the residual scores (not shown), N=311)WEEKS1.00 2.00 3.00 4.00 5.00 6.00 7.00 8.00 9.00 10.00 11.00 12.00100 5.29 1.14 0.86 0.71 0.71 0.67 0.83 0.29 0.71 1.17 0.50 0.33200 2.31 1.77 1.14 0.77 0.69 1.08 0.92 0.85 0.46 1.38 1.00 0.45300 2.20 1.21 0.80 0.86 1.07 0.62 0.36 1.14 0.64 1.29 1.67 0.92400 2.33 1.07 0.87 0.71 1.21 0.29 0.71 0.71 0.86 1.00 1.15 0.83500 1.64 1.50 1.43 0.69 0.86 0.54 1.38 1.15 0.77 1.08 0.58 1.08600 1.11 1.06 0.72 0.76 0.94 1.00 1.56 0.88 1.29 1.12 0.53 0.73700 1.53 0.72 0.63 0.89 0.72 0.88 1.24 0.72 1.00 1.12 0.38 1.06800 1.47 0.68 0.79 0.83 1.17 0.94 0.82 1.06 1.06 0.56 1.44 0.94900 1.32 1.11 1.32 0.89 1.00 1.06 1.59 1.06 0.78 0.89 0.81 0.631000 0.72 1.06 1.22 1.41 0.89 1.18 1.41 1.47 0.71 1.12 1.40 1.07Thus, although caution is required when <strong>in</strong>terpret<strong>in</strong>g the above results due to the samplesizes <strong>in</strong>volved, the results suggest different profiles across the different areas. That said, forevery area, the largest Knox ratio (and residual) was for the shortest space-time <strong>in</strong>terval,suggest<strong>in</strong>g the ubiquity of this f<strong>in</strong>d<strong>in</strong>g at all levels of geographic resolution.Temporal variation?For a number of reasons, it is possible that the profile of the communication of risk for eacharea may change over time. For <strong>in</strong>stance, different offenders may adopt dist<strong>in</strong>ct forag<strong>in</strong>gstrategies. Some may prefer to commit <strong>crime</strong>s very close to previously burgled homesimmediately afterwards, whereas others may prefer to commit them nearby after a short<strong>in</strong>terval has elapsed. This may particularly affect the time-space pattern<strong>in</strong>g of burglary if newoffenders move <strong>in</strong>to an area, were arrested or move elsewhere. Also, it is possible that thedevelopment or demolition of hous<strong>in</strong>g would change the availability of targets and hence thepatterns of <strong>crime</strong>.For this reason, Knox profiles were generated for Mansfield and ‘A’ Division for sequentialtime periods to determ<strong>in</strong>e whether or not the profiles do change, and if so <strong>in</strong> what way. To dothis, for each area a Knox profile was generated us<strong>in</strong>g twelve months worth of data. Next, anew profile was generated us<strong>in</strong>g twelve months of data but which, compared to the previousanalysis, <strong>in</strong>cluded the next two weeks of data, and excluded the oldest two weeks of data.This was repeated 22 times for each area. Thus the analysis was completed us<strong>in</strong>g a mov<strong>in</strong>gw<strong>in</strong>dow of data, which <strong>in</strong>cluded new data on each iteration. The results of the analyses werethen animated and compared.The general pattern of results suggested that while the Knox profiles did vary a little from oneprofile to the next they tended to rema<strong>in</strong> stable over time. This may suggest that, <strong>in</strong> general,offenders adopt similar forag<strong>in</strong>g patterns or that a sufficiently small proportion of activeburglars were ever <strong>in</strong> custody to modify the overall picture. There is ubiquity of the f<strong>in</strong>d<strong>in</strong>gthat burglary clusters <strong>in</strong> space and time, as evidenced by recent research that shows thatthese patterns are apparent <strong>in</strong> all other countries for which data have so far been analysedsuch as the UK, US, Netherlands, New Zealand and Australia (Johnson et al., 2006). Oneexplanation for the differences <strong>in</strong> the profiles observed for each area could relate todifferences <strong>in</strong> target density between the different areas. Thus, the risk of victimisation maycommunicate over greater distances <strong>in</strong> areas <strong>in</strong> which houses are more dispersed, whereasrisks may communicate over shorter distances where houses are spatially concentrated and17


hence available nearby targets plentiful. Considerations of land use provide the mostplausible accounts of such area variation <strong>in</strong> pattern. Other possibilities exist.Predict<strong>in</strong>g the futureHav<strong>in</strong>g demonstrated that the risk of burglary is <strong>in</strong>deed communicable <strong>in</strong> the East Midlands,the next task was to determ<strong>in</strong>e whether it is sufficiently predictable to suggest that theproduction of predictive <strong>mapp<strong>in</strong>g</strong> software would aid <strong>operational</strong> polic<strong>in</strong>g. Thus, research wasconducted to compare the effectiveness of:1. Promap;2. what the police are currently do<strong>in</strong>g;3. a simple variant of retrospective hotspott<strong>in</strong>g; and4. what might be expected if areas were prioritised for <strong>crime</strong> reductive attentionrandomly.At the time of the research, none of the areas currently used retrospective <strong>mapp<strong>in</strong>g</strong>techniques per se. Instead, they generated p<strong>in</strong> maps on a fortnightly basis us<strong>in</strong>g two weeks’data. This simply <strong>in</strong>volved generat<strong>in</strong>g a map which shows the locations of all burglaries thatoccurred with<strong>in</strong> the previous two weeks. On the basis of these maps, <strong>operational</strong> resourcesmay be deployed. This is similar to retrospective hotspot <strong>mapp<strong>in</strong>g</strong> <strong>in</strong> that both methodssummarise historic data, and hence <strong>in</strong> what follows the authors will use retrospectivehotspott<strong>in</strong>g as a proxy for what the analysts currently do. However, it should be noted thatproblems with p<strong>in</strong> <strong>mapp<strong>in</strong>g</strong> are well documented (e.g. Cha<strong>in</strong>ey & Ratcliffe, 2005) and thus theretrospective approach used here as an analogue is significantly superior to what the analystswere do<strong>in</strong>g.Item 2 <strong>in</strong> the list above has thus been elim<strong>in</strong>ated, be<strong>in</strong>g a sub-optimal type of retrospectivehotspott<strong>in</strong>g. As is <strong>in</strong>tuitively clear, random allocation of resources will be less efficient thaneither prospective or retrospective hotspott<strong>in</strong>g, so the choice of method comes down toprospective or retrospective. While necessarily technical, the rema<strong>in</strong>der of this section shouldbe read at least <strong>in</strong> a cursory way by the <strong>in</strong>terested practitioner, s<strong>in</strong>ce it identifies thecomputational differences between the two primary contend<strong>in</strong>g approaches.The technique most commonly used to identify hotspots <strong>in</strong>volves the generation of a twodimensionallattice to represent the area of <strong>in</strong>terest. As shown <strong>in</strong> Figure 2.2, a twodimensionallattice (Fig. 2.2(2)) is overla<strong>in</strong> upon a study area (Fig. 2.2(1)). This comprises aseries of (x*y) cells, each with identical proportions. The challenge of del<strong>in</strong>eat<strong>in</strong>g a hotspotlies <strong>in</strong> the derivation of a set of values, one per cell, that reflects the <strong>in</strong>tensity of <strong>crime</strong> risk ateach location. Thus, a methodology and mathematical algorithm is required that can generaterisk <strong>in</strong>tensity values for every cell. One technique commonly used to do this is called the‘mov<strong>in</strong>g w<strong>in</strong>dow’. Here, a circle with a predeterm<strong>in</strong>ed radius (referred to as the bandwidth) isdrawn from the midpo<strong>in</strong>t of each cell (Fig. 2.2(3)), and each of the events that falls with<strong>in</strong> thecircle is used to generate the risk <strong>in</strong>tensity value for that cell. The risk <strong>in</strong>tensity value for eachcell is determ<strong>in</strong>ed by the number of <strong>crime</strong> events (<strong>in</strong> Figure 2.2(1), four for the cellconsidered) that occurred with<strong>in</strong> the circle and how far away they are located from themidpo<strong>in</strong>t of the cell. Those closest to the midpo<strong>in</strong>t are typically assigned a greater weight<strong>in</strong>gthan those further away. To illustrate the method, three of the cells <strong>in</strong> Figure 2.2(3) have beenshaded to <strong>in</strong>dicate the <strong>in</strong>tensity of risk at those locations. Those shaded darkest exhibit thehighest risks. An example of a hotspot (quartic) function (Bailey & Gatrell, 1995) is describedby equation (1):223 ⎛ d ⎞( ) = 1 ⎟2 ⎜ −iλτs ∑(1)2di≤τπτ ⎝ τ ⎠Where, λτ(s)= risk <strong>in</strong>tensity value for cell s τ = bandwidthd i = distance of each po<strong>in</strong>t (i) with<strong>in</strong> the bandwidth from the centroid of the cell18


The bandwidth used to generate the hotspot, and the mathematical equation used togenerate the risk <strong>in</strong>tensity values vary, but the basic rationale is the same. Unfortunately,these are typically not <strong>in</strong>formed by theory or by an <strong>in</strong>-depth understand<strong>in</strong>g of the <strong>crime</strong>problem, but often because they produce elegant maps. In other cases, the default sett<strong>in</strong>gsof the software used are adopted.Figure 2.2: Two-dimensional and three-dimensional hotspot lattices (1. study area, 2.study plus lattice, 3. lattice and retrospective mov<strong>in</strong>g w<strong>in</strong>dow, 4. lattice and prospectivemov<strong>in</strong>g w<strong>in</strong>dow) (Figure taken from Johnson et al., 2005)(1) (2)(3)(4)d 1Spatial distanceSpatial distanced 2d 1Spatial distanceSpatial distancetimeCrime events Bandwidths Street networks▼ occurred 1 week ago d 1 – Spatial bandwidth● occurred 2-4 weeks ago d 2 – Temporal bandwidth<strong>Prospective</strong> maps are generated us<strong>in</strong>g a variant of the mov<strong>in</strong>g w<strong>in</strong>dow technique. The novelfeature is that the amount of time elapsed between events is considered as well as thedistance between the <strong>crime</strong> events and cells. When def<strong>in</strong><strong>in</strong>g the model used, considerationof the size of the cells used <strong>in</strong> the two-dimensional lattice is required.Whilst the optimal size is difficult to determ<strong>in</strong>e, it is clear that if a cell is too large much effortwould be wasted <strong>in</strong> polic<strong>in</strong>g low risk locations. Overly large cells would also suffer from theModifiable Areal Unit Problem (Openshaw, 1995) discussed above. For <strong>in</strong>stance, if onecalculates a risk <strong>in</strong>tensity value for one large area which encapsulates two smaller areas withvery different risks, the true risks for neither of the smaller areas will be accurately reflectedby the risk <strong>in</strong>tensity value for the aggregated area. Thus, it is wise to use a cell size thatenables differences <strong>in</strong> relative risk across (and with<strong>in</strong>) cells with<strong>in</strong> the lattice to be revealedaccurately. However, it is also wise to avoid cell sizes that are simply too small. For<strong>in</strong>stance, it is unlikely that a method which used one million cells, each 1m x 1m, would revealmore useful <strong>in</strong>telligence than a method <strong>in</strong> which larger cells were used.19


A further po<strong>in</strong>t of note concerns the trade-off between hav<strong>in</strong>g cells of small proportions, which<strong>in</strong>creases the precision of the maps generated, and the time taken to complete thecalculations. For <strong>in</strong>stance, the generation of a forecast for a grid which has 100m x 100mcells will take one-quarter of the time that it would take to complete the same task for a gridwhich conta<strong>in</strong>s cells that are 50m x 50m. Where analyses are required for an area the size of‘A’ Division, this can be of considerable importance. One issue then concerns the timelyproduction of the forecasts, a consideration whose importance will be amplified if the analysthas to produce forecasts with<strong>in</strong> a limited w<strong>in</strong>dow of time.The next issue concerns the bandwidth used. As is illustrated <strong>in</strong> Figure 2.2(4), Promap usestwo bandwidths. The first, the spatial bandwidth, may be calibrated <strong>in</strong> a variety of ways butshould relate to the distance over which the risk of victimisation is communicable.The second type of bandwidth concerns the time elapsed s<strong>in</strong>ce a <strong>crime</strong> occurred and theproduction of the forecast. This bandwidth is conditional upon the first, as a burglary eventshould contribute to the risk <strong>in</strong>tensity value of a cell only if it occurred with<strong>in</strong> a given distanceof that cell. As with the spatial parameter, for the temporal bandwidth a variety of sett<strong>in</strong>gscould be used but aga<strong>in</strong> this should reflect the period of time over which the communicabilityof risk can reasonably be expected to endure, or slightly longer.A further methodological difference between the authors’ approach and that used <strong>in</strong>retrospective hotspott<strong>in</strong>g lies <strong>in</strong> avoid<strong>in</strong>g use of the distance from the midpo<strong>in</strong>t of the cell andthe relevant burglary events <strong>in</strong> the derivation of the risk <strong>in</strong>tensity values. Consider that forretrospective hotspott<strong>in</strong>g a risk <strong>in</strong>tensity value is calculated for the midpo<strong>in</strong>t of the cell and thisvalue is then allocated to all other po<strong>in</strong>ts with<strong>in</strong> that cell. If risk <strong>in</strong>tensity values werecomputed for all po<strong>in</strong>ts with<strong>in</strong> a cell it is unlikely that they would be identical. Thus, us<strong>in</strong>g thevalue for the centroid of the cell gives the impression that the risk of victimisation is uniformacross the cell. This is unlikely to be true. This problem will be amplified as the cell size<strong>in</strong>creases. Instead of us<strong>in</strong>g the exact Euclidian distance between all events and the cellmidpo<strong>in</strong>t, for Promap the number of cells, the actual unit of analysis considered, between theevent and the cell is <strong>in</strong>stead used. Thus, if a <strong>crime</strong> occurred with<strong>in</strong> the cell underconsideration, the distance would be zero (actually, for computational reasons 1), if itoccurred with<strong>in</strong> an adjacent cell, two, and so on. By adopt<strong>in</strong>g this approach the risk <strong>in</strong>tensityvalues for each cell are likely to reflect more accurately the risks across the entire cell, ratherthan at one s<strong>in</strong>gle po<strong>in</strong>t. Formula (2) was used to derive the risk <strong>in</strong>tensity values for theprospective map, as follows:⎛ 1 ⎞ 1λτ( s)= ∑⎜1+ ∗ci ei c⎟(2)≤τ∩ ≤υ⎝ i ⎠ eiWhere,τ(s)bandwidthc i = number of cells between each po<strong>in</strong>t (i) with<strong>in</strong> the bandwidth and the celle i = time elapsed for each po<strong>in</strong>t (i) with<strong>in</strong> the temporal bandwidthλ = risk <strong>in</strong>tensity value for cell s τ = spatial bandwidth υ = temporalEvaluat<strong>in</strong>g the accuracy of the different methodsAs discussed <strong>in</strong> earlier work (e.g. Bowers et al., 2004), there has been little attention given tothe measurement of the accuracy of <strong>mapp<strong>in</strong>g</strong> techniques used to <strong>in</strong>form the deployment of<strong>operational</strong> resources. This is clearly essential. For this reason, <strong>in</strong> earlier papers the authorsproposed a number of different standard metrics. These <strong>in</strong>clude the hit rate, which is simplythe number of future <strong>crime</strong>s correctly identified. A second important factor is the area of the‘at risk’ locations to be policed. Where <strong>operational</strong> resources are limited, to compare twotechniques one may need to equate the latter to allow a like-for-like comparison. One way ofcontroll<strong>in</strong>g for this is to select the same geographic area for each method and then comparethe hit rate for each. Where possible this approach has been adopted <strong>in</strong> what follows. Arelated question concerns the area that should be selected with<strong>in</strong> which <strong>crime</strong> could occur. In20


a densely populated urban area this can often be done by simply generat<strong>in</strong>g a rectangulargrid and select<strong>in</strong>g a percentage of the cells. However, <strong>in</strong> a more rural area such asDerbyshire and the other areas considered here, this approach would be less useful. A largeproportion of the grid would not conta<strong>in</strong> any houses, and hence opportunities for burglary.Thus, to make the analyses realistic, for each area an opportunity surface was approximatedus<strong>in</strong>g the data available. Specifically, every burglary was mapped us<strong>in</strong>g a GIS and buffer of1km for each po<strong>in</strong>t generated. Next, those cells def<strong>in</strong>ed by this process were selected andthe rest discarded. Figure 2.3 shows an example for ‘A’ Division. The left panel shows arectangular grid which encapsulates all of the <strong>crime</strong> events. The panel on the right shows theopportunity surface as def<strong>in</strong>ed us<strong>in</strong>g the above method. This map (non-white areas) conta<strong>in</strong>sapproximately 50 per cent of the rectangle and thus demonstrates the importance of thismethod. For <strong>in</strong>stance, consider that if ten per cent of the surface area of each map wasselected to allow a standard comparison between two <strong>mapp<strong>in</strong>g</strong> techniques, for the map onthe left one would actually select around twice as much area as one would for the map on theright. Whilst this is not a perfect solution it represents a considerable advantage over thealternative by exclud<strong>in</strong>g places where burglary cannot happen.Figure 2.3: Opportunity surface for ‘A’ DivisionIn the current research two further standards for comparison were constructed. The firstsimulated what would be expected on the basis of chance. That is to say, how much betterwould it be to use the methods than to simply direct resources to locations on the basis ofchance? To do this, Monte-Carlo simulation was used to generate a chance distribution. Toelaborate, for each area ten per cent of the opportunity surface for that study area wasselected at random us<strong>in</strong>g a pseudo-random number generator. The accuracy of theserandom forecasts was then compared to the actual distribution of <strong>crime</strong>s <strong>in</strong> the same way asabove. For each area, this was repeated a number of times (<strong>in</strong> this case, 50) and theaverage of the simulations computed. The size of the cells selected us<strong>in</strong>g this approach werevaried (100m, 400m, and 1km) to test the sensitivity of so do<strong>in</strong>g. This is a simpleapproximation to choos<strong>in</strong>g a specific location, a street or a neighbourhood. However, theresults produced us<strong>in</strong>g each of these different levels of resolution were remarkably consistentand hence we will <strong>report</strong> only those generated for 100m cells.A second issue is discussed <strong>in</strong> some detail below but uses exist<strong>in</strong>g statistical methodology toderive a measure of the extent to which hotspots generated by different methods vary <strong>in</strong>terms of coalescence. That is, are there a large number of hot cells that are generally somedistance from each other, or are there a smaller number of coherent hotspots. The latter may21


etrospective method for seven-day forecasts for Mansfield and Corby, although the actualdifferences were (reliable but) small.Table 2.22: Average number of <strong>crime</strong>s correctly identified per forecast for cumulativemethods (N=22)Retrospective Promap (specific) Promap (classic)2 days 7 days 2 days 7 days 2 days 7 daysWell<strong>in</strong>gborough 3.26 10.96 4.32* 15.68* 4.17* 14.7*Mansfield 3.32 10.18 3.59 11.05* 3.46 10.73*Corby 0.68 3.32 0.90 3.59 0.68 3.55+‘A’ Division 3.32 11.36 4.77* 15.77* 5.55* 19.68** Significantly better than retrospective method (p


Table 2.24: Average number of <strong>crime</strong>s correctly identified per forecast for s<strong>in</strong>gle po<strong>in</strong>tmethods (N=22)Retrospective Promap (specific) Promap (classic)2 days 7 days 2 days 7 days 2 days 7 daysWell<strong>in</strong>gborough 3.26 10.96 3.46* 13.00* 3.73* 13.54*Mansfield 3.32 10.18 2.68 8.23 3.32 9.50Corby 0.68 3.27 0.55 2.81 0.91+ 3.46‘A’ Division 3.32 11.36 4.72* 15.68* 5.32* 19.00** Significantly better than retrospective method (p


Figure 2.4: Differences <strong>in</strong> cells identified as be<strong>in</strong>g at the highest future risk byretrospective and prospective methods (cells shaded darkest have the highest risk<strong>in</strong>tensity values)On the one hand this is not a problem as it demonstrates that the prospective method is moreaccurate than the retrospective approach probably because it accurately identifies morelocations that are at risk of burglary, particularly those that are yet to be victimised. Thus, theabove results provide a good test of and support for the theory proposed. On the other hand,<strong>in</strong> terms of practical polic<strong>in</strong>g, as the prospective maps identify more areas this means that theresults are not strictly comparable.One way of facilitat<strong>in</strong>g a direct comparison would be to select a smaller percentage of thecells as identified at risk by the prospective method. However, this means that the authorswould unfairly disadvantage the prospective method by constra<strong>in</strong><strong>in</strong>g how it works <strong>in</strong> a waywhich is precluded for the retrospective method. An alternative approach is to <strong>in</strong>crease thenumber of cells the retrospective method identifies as hav<strong>in</strong>g a higher risk <strong>in</strong>tensity value. Todo this, the above analyses were repeated for ‘A’ Division us<strong>in</strong>g additional historic data <strong>in</strong> thegeneration of each forecast. Instead of eight weeks of data, twelve were used. The samevolume of data was also used for the prospective methods to make the test comparable. Dueto the time <strong>in</strong>volved <strong>in</strong> the analysis, this was not completed for the other areas.Table 2.26: Predictive accuracy for analyses for which the same number of cells wereidentified by each method (N=22)Retrospective Promap specific Promap (classic)2 days 7 days 2 days 7 days 2 days 7 days‘A’ Division 58% 61% 66%+ 66%* 64%+ 64%** Significantly better than retrospective method (p


Patroll<strong>in</strong>g efficiencyAs discussed elsewhere (Bowers et al., 2004), even though a map may predict a largevolume of <strong>crime</strong>, it may be of little utility <strong>in</strong> an <strong>operational</strong> <strong>context</strong> if it is made of a largenumber of dispersed hotspots. The best map would perhaps be one with a relatively smallnumber of clearly def<strong>in</strong>ed hotspots. One way of measur<strong>in</strong>g this is to count the number ofhotspots generated. Another way, which is slightly more sophisticated is to conduct a nearestneighbour analysis.Nearest neighbour analysis is a test of spatial randomness. The nearest neighbour <strong>in</strong>dex(nni) <strong>in</strong> particular measures how clustered po<strong>in</strong>ts or cells are relative to what would beexpected on the basis of chance. Here, the authors consider the application of this to theanalysis of hot cells - the ten per cent of cells with the highest risk <strong>in</strong>tensity values. How closetogether are they? In this <strong>context</strong>, a value of one would <strong>in</strong>dicate that the hot cells wererandomly distributed across the area. The lower the value of the nni, the more the hot cellscoalesce to form coherent (and hence policeable) hotspots. The <strong>in</strong>dex can be computed forthe nearest high-risk neighbour for each cell, which will often be the adjacent cell. It can alsobe computed for the next nearest neighbour, the next, and so on, up to k-orders. The value ofk is specified by the researcher. Thus, the k-order parameter describes which neighbour isbe<strong>in</strong>g analysed, the nearest (1st order), the next nearest (2nd order) and so on (up to the kthorder). To illustrate, consider Figure 2.5. The nni for the two examples would be the samefor the first order nearest neighbours. However, for the data on the left the second order nniwould be lower than that for the data on the right, thereby <strong>in</strong>dicat<strong>in</strong>g that the hot cells <strong>in</strong> theformer are more spatially clustered than the latter. The most efficient hotspots would perhapsbe those with a low nni for the nearest neighbour, for the next, but particularly for the higherorders. This is because the greater the number of orders for which the nni rema<strong>in</strong>s low is an<strong>in</strong>dication of a lower number of hotspots that are more coalescent. A series of dispersedhotspots would have a low distance for the first neighbour, but the distance would <strong>in</strong>crease foreach successive order. A patroll<strong>in</strong>g police officer would then have to spend more time mov<strong>in</strong>gthrough low risk areas.Figure 2.5: Illustration of a simple nearest neighbour analysis for two data sets● ● ● ●●●●●Readers may be aware that this type of analysis is traditionally used to exam<strong>in</strong>e the degree towhich <strong>crime</strong> is clustered <strong>in</strong> space, but as should be evident from the above rationale it is ofclear analytic value here, albeit a novel application of the test. To recapitulate, this type ofanalysis can be used as one <strong>in</strong>dex of patroll<strong>in</strong>g efficiency. The lower the nni for higher k-orders, the more efficient the map <strong>in</strong> this respect. Figure 2.6 shows an example analysis ofthis k<strong>in</strong>d for ‘A’ Division for both a retrospective hotspot and for a prospective map. Theresults are clear. The prospective map has a low nni across all orders, whereas for theretrospective map whilst the nni is <strong>in</strong>itially low, at around order ten it starts to <strong>in</strong>crease.Analyses for other maps generated for different days revealed the same pattern of results. Itis difficult to overstate the importance of this result for the applicability of Promap to patroldeployment.26


Figure 2.6: Nearest neighbour <strong>in</strong>dex: retrospective and prospective methods0.60.5nearest neighbour <strong>in</strong>dex0.40.30.20.1retrospectiveprospective01 9 17 25 33 41 49 57 65 73 81 89 97k-orderThe results of the nearest neighbour analysis suggest that the prospective method generateshotspots that are perhaps of more practical use than their retrospective equivalents, <strong>in</strong> thatthey yield more burglary risk per distance moved for patroll<strong>in</strong>g officers.Shift by shift analysisA still further development of the system would be to generate predictions that were specificto particular police shifts. Recorded <strong>crime</strong> data are imperfect for this purpose, s<strong>in</strong>ce theyreta<strong>in</strong> a degree of uncerta<strong>in</strong>ty about the precise time of an event, but with<strong>in</strong> the limits of thedata to hand, know<strong>in</strong>g how <strong>crime</strong> patterns vary by shift offers a clear <strong>operational</strong> benefit.Otherwise, a forecast for the day would represent the average pattern over the three shifts,but fail to represent the actual geographical patterns for any <strong>in</strong>dividual shift. Simpson’sparadox emerges aga<strong>in</strong>! To illustrate, consider two areas, A and B. Area A has a high <strong>crime</strong>risk dur<strong>in</strong>g the morn<strong>in</strong>g and even<strong>in</strong>g, whereas area B has its highest risk dur<strong>in</strong>g the afternoon.If one takes the average risks across the two areas, area A would be identified as hav<strong>in</strong>g thegreater overall risk. However, dur<strong>in</strong>g the afternoon it would be area B to which <strong>operational</strong>resources would most profitably be deployed. The importance of this effect depends upon anumber of factors, one of which is the particular <strong>operational</strong> tactics to be deployed. Wherehigh visibility polic<strong>in</strong>g is used, or temporary measures are implemented with celerity, it iscrucial to know how <strong>crime</strong> problems move over the course of the day. If longer term <strong>crime</strong>prevention <strong>in</strong>terventions are deployed, the highest implementation dosage would be directedto the areas that have the overall highest risks. The po<strong>in</strong>t can be made the other way round.Between-shift differences <strong>in</strong> present<strong>in</strong>g <strong>crime</strong> problems should be one factor <strong>in</strong> determ<strong>in</strong><strong>in</strong>gthe balance between short-term and long-term <strong>in</strong>terventions.To summarise the story so far:1. the effects identified <strong>in</strong> Promap are robust, occurr<strong>in</strong>g with slight variation across allthe areas studied;2. explor<strong>in</strong>g the relationships closely offers a route forward to ref<strong>in</strong><strong>in</strong>g and optimis<strong>in</strong>gPromap;3. the basic <strong>in</strong>strument could be developed to meet the tailored needs of a will<strong>in</strong>g policearea.27


3. Tactical options and select<strong>in</strong>g a pilot siteIn this section there will be a discussion of process by which a pilot area was chosen.Additionally, consideration is given to the types of tactical option that might be usefullyemployed alongside the system developed. The reason for this was that the success of any<strong>crime</strong> reduction strategy is cont<strong>in</strong>gent upon the identification of the right tactical options thatwill trigger the relevant <strong>crime</strong> reduction mechanisms (e.g. Tilley, 1993). In the current project,which places its emphasis on the application of a predictive <strong>mapp<strong>in</strong>g</strong> system updatedrout<strong>in</strong>ely, consideration of a number of factors is required. At the time of the research, thefollow<strong>in</strong>g section was produced to provide a number of tactical options that could be used<strong>operational</strong>ly to realise the advantages which may accrue from use of the Promap technique.S<strong>in</strong>ce the Promap exercise currently concentrates on the <strong>crime</strong> of domestic burglary(although it has wider potential applicability) so too do the tactical options. It is important tosay that despite this exercise the authors deferred to the polic<strong>in</strong>g craft of the <strong>operational</strong>officers who used Promap. The attempt here is simply to make available their current th<strong>in</strong>k<strong>in</strong>gon tactical implications based on the literature on effective <strong>crime</strong> reduction.To provide a <strong>context</strong> for the review that follows, similarities and differences among the threepolice BCUs that were selected as potential pilot sites for the study will be outl<strong>in</strong>ed. Follow<strong>in</strong>gfrom this, a matrix of a number of tactical options, constructed from evidence of what works,will be discussed. The matrix also provides some guidance on the agencies that are <strong>in</strong> alllikelihood most suitably placed to implement the different options at the local level. This will befollowed by a discussion of a number of novel possible tactics. F<strong>in</strong>ally, the area andtimescales for the delivery of these tactics will be mentioned emphasis<strong>in</strong>g the necessarymechanisms needed to reduce burglary.Potential pilot sitesTo identify a suitable pilot site researchers visited three areas dur<strong>in</strong>g the first quarter of 2005to ga<strong>in</strong> an <strong>in</strong>-depth knowledge of how each dealt from day to day with its problem ofresidential burglary from both analytical and <strong>operational</strong> perspectives. Visits took place overten weeks and <strong>in</strong>volved meet<strong>in</strong>gs with key officers as well as attendance at task<strong>in</strong>g and coord<strong>in</strong>ationmeet<strong>in</strong>gs for each of the areas. The three sites visited were Corby andWell<strong>in</strong>gborough <strong>in</strong> the Northamptonshire force area and, ‘A’ Division <strong>in</strong> DerbyshireConstabulary. Table 3.1 provides a comparison of the areas and summarises some of thema<strong>in</strong> po<strong>in</strong>ts for each.All three areas were National Intelligence Model (NIM) compliant and task<strong>in</strong>g and coord<strong>in</strong>ationis thus organised <strong>in</strong> a similar way. ‘A’ Division is much larger than either Corby orWell<strong>in</strong>gborough Sectors, compris<strong>in</strong>g an entire BCU, and had a much higher volume ofdomestic burglary. Intelligence is dissem<strong>in</strong>ated <strong>in</strong> a similar fashion across the three areas andall analysts were capable of produc<strong>in</strong>g <strong>crime</strong> po<strong>in</strong>t maps us<strong>in</strong>g a GIS, and did so fortnightly.None of the analysts <strong>in</strong> any of the areas rout<strong>in</strong>ely (if at all) generated retrospective hotspotmaps of the k<strong>in</strong>d discussed <strong>in</strong> the previous chapter. All three areas have gazetteers that cangeocode data. This is done only when a map is produced. The geocod<strong>in</strong>g process itselfappeared to be quick <strong>in</strong> all areas. However if the datum was not assigned a postcode (as isthe case <strong>in</strong> about 10% of <strong>crime</strong>s), geocod<strong>in</strong>g was manual and hence time-consum<strong>in</strong>g. Whileeach area had a different <strong>crime</strong> record<strong>in</strong>g system, ‘A’ Division <strong>in</strong>corporated the most recentdata as its system was updated every twenty-four hours.28


Table 3.1: Comparison of three potential pilot sitesKey QuestionsHow many burglariesoccur per year onaverage <strong>in</strong> recent years?What is the annualburglary rate per 1,000householdsWhat is the annualdetection rate?AreaCorby Well<strong>in</strong>gborough ‘A’ DivisionApprox 900* Approx 650+ Approx 18006.7** 9.9** 7.5***Approx 12%* Approx 10%+ Approx 13%Burglary a priority? Moderate Moderate HighIs there a targetedOperation Bustedburglary <strong>in</strong>itiative <strong>in</strong>(Jan – Mar 2005)place?How quickly does dataget onto the <strong>crime</strong>record<strong>in</strong>g system?Operation Yarn(Feb 2005onwards)24 hrs-2 days 24 hrs-3 days 24 hrsHow many analysts arethere?2 2 2GIS software used? MapInfo MapInfo Blue8What k<strong>in</strong>d of maps doanalysts produce andhow often are theyproduced?- retrospective po<strong>in</strong>tmaps fortnightly- choropleth mapsevery 6 months- retrospectivepo<strong>in</strong>t mapsfortnightly- choroplethmaps every 6months- retrospectivepo<strong>in</strong>t mapsfortnightly- contour hotspotmaps every 6monthsHow often do key officersmeet to discuss<strong>in</strong>telligence and tactics?Are there any ways<strong>in</strong>telligence isdissem<strong>in</strong>ated to officersoutside of scheduledmeet<strong>in</strong>gs?How eager is the area toparticipate?- daily task<strong>in</strong>g- daily ‘gold’meet<strong>in</strong>g- 2-week tacticaltask<strong>in</strong>g and coord<strong>in</strong>ation- 6-monthstrategicassessment‘front page’<strong>in</strong>ternal website- daily task<strong>in</strong>g- 2-week tacticaltask<strong>in</strong>g and coord<strong>in</strong>ation- monthly <strong>operational</strong>performance group- 6-month strategicassessmentNo- daily task<strong>in</strong>g- daily command- 2-week tacticaltask<strong>in</strong>g and coord<strong>in</strong>ation- 6-monthstrategicassessmentNoModerately Moderately Extremely* This figure is for the whole of the Northern Area (2 Sectors), thus figures for Corby Sector itself would be lower+ This figure is for the whole of the Eastern Area (2 Sectors), thus figures for Well<strong>in</strong>gborough Sector itself would belower** Denom<strong>in</strong>ator derived from the 2001 Census*** This figure is based on figures from the 2003/2004 bus<strong>in</strong>ess plan29


Select<strong>in</strong>g a pilot siteThe decision as to which area <strong>in</strong> which to implement the pilot was taken by a steer<strong>in</strong>g groupwhich <strong>in</strong>cluded members of the Home Office, Government Office for the East Midlands andresearchers from the UCL Jill Dando Institute of Crime Science. The ma<strong>in</strong> reasons forselect<strong>in</strong>g the site chosen, ‘A’ Division, were that the Command Team expressed a strongdesire to participate <strong>in</strong> the pilot, they were especially concerned with the residential burglaryproblem <strong>in</strong> their Division, and they had been experienc<strong>in</strong>g a stable volume of burglary prior tothe pilot.A tactical options matrix for reduc<strong>in</strong>g burglaryInnovations require new ways of th<strong>in</strong>k<strong>in</strong>g. Early software often sought to mimic electronicallywhat had previously been done manually. Only with time was the potential to do th<strong>in</strong>gs <strong>in</strong> newways realised. One poignant <strong>in</strong>stance of how <strong>in</strong>novation requires reth<strong>in</strong>k<strong>in</strong>g comes with the<strong>in</strong>troduction of the battle tank. Its qualified success upon <strong>in</strong>troduction at the Battle of Cambraiderived from the failure to modify <strong>in</strong>fantry movements to capitalise on the advantages createdby the tank, with long-term unhappy consequences for military tactics (see Dixon 1976). Theworst fate for Promap (short of neglect) would be implementation without reth<strong>in</strong>k<strong>in</strong>g polic<strong>in</strong>gtactics.As noted above, prior to the start of the pilot a literature review was undertaken to summarisethe available literature on tactical options used <strong>in</strong> the reduction of burglary, so that those thatmight be used <strong>in</strong> response to the maps could be identified. However, by outl<strong>in</strong><strong>in</strong>g theapparent efficacy of extant burglary reduction tactics, <strong>in</strong> a sense one falls <strong>in</strong>to the mode ofthought which Promap is <strong>in</strong>tended to make obsolete. Improv<strong>in</strong>g one’s capacity to predictthereby changes the terra<strong>in</strong>. It may mean that hitherto untried or apparently unsuccessfulapproaches become potentially effective. For example, the potential of patroll<strong>in</strong>g as a <strong>crime</strong>reductive measure has generally been considered low, but when directed by better prediction,this may change. At the risk of appear<strong>in</strong>g to oversell Promap, it may change the ground rulesfor <strong>crime</strong> reduction. For this reason, it was strongly emphasised that the learn<strong>in</strong>g process<strong>in</strong>volved <strong>in</strong> field test<strong>in</strong>g may <strong>in</strong>volve reth<strong>in</strong>k<strong>in</strong>g some of what is set out below.There is no s<strong>in</strong>gle menu of burglary reductive options that is guaranteed to work <strong>in</strong> allcircumstances, rather measures need to be tailored accord<strong>in</strong>g to the specific opportunitiesand situations apparent <strong>in</strong> an area. One of the ma<strong>in</strong> reasons why replications of <strong>in</strong>terventionsoften fail is because the knowledge and understand<strong>in</strong>g of the specific <strong>context</strong>s andmechanisms for an <strong>in</strong>tervention are lack<strong>in</strong>g (Tilley, 1993). Sometimes sheer lack of effortmakes for implementation failure. Someth<strong>in</strong>g that has been successful <strong>in</strong> one area or situationwill not automatically be successful <strong>in</strong> others. As such, it must be recognised that whichevertactical options are selected to be used with the predictive <strong>mapp<strong>in</strong>g</strong> system, they may need tobe specifically tailored for the purpose of reduc<strong>in</strong>g residential burglary <strong>in</strong> the chosen pilotarea. Moreover, the most effective burglary prevention strategies <strong>in</strong>volve a comb<strong>in</strong>ation ofcomplementary responses (Lamm Weisel, 2002), and hence consideration of how a variety ofdifferent <strong>in</strong>terventions might <strong>in</strong>teract, and/or complement the system should be considered.To <strong>in</strong>form this element of the project, a review of the available literature was conducted and ispresented here as a Tactical Option Matrix <strong>in</strong> Table 3.2. The matrix can be broken down <strong>in</strong>tofive ma<strong>in</strong> component parts: the type of <strong>in</strong>tervention, a summary of the evidence of itseffectiveness, cost (f<strong>in</strong>ancial and latency of implementation), the geographical coverage of themeasures, and the potential partners who may be <strong>in</strong>volved <strong>in</strong> the implementation of that<strong>in</strong>tervention. The follow<strong>in</strong>g sections elaborate upon and clarify the content of these fiveelements of the matrix.Types of <strong>in</strong>tervention and evidence of effectivenessThe list is not exhaustive by any means, however, the most commonly used <strong>crime</strong> preventionmeasures for reduc<strong>in</strong>g residential burglary are discussed. Over the last two decades therehas been a plethora of research on the effectiveness of various types of <strong>crime</strong> preventionmeasures and some of the key studies are mentioned here. While the authors are cognisant30


that each study varies <strong>in</strong> its research design and analytical techniques and thus cannottherefore be directly compared, the Tactical Options Matrix merely provides a summary of<strong>in</strong>formation and is therefore not <strong>in</strong>clusive of every op<strong>in</strong>ion on each measure. In relation to thesymbols used, +, --- and – symbols are used to illustrate whether the <strong>in</strong>tervention has worked<strong>in</strong> the past, had no impact, or did not work respectively. In some cases, reviews are mixedand both a + and – sign are given to the <strong>in</strong>tervention. As mentioned previously, ultimately thetactical options selected for this project could have <strong>in</strong>cluded a comb<strong>in</strong>ation of the <strong>in</strong>terventionspresented here, and would be affected by the partners <strong>in</strong>volved and their ability to implementthe tactics <strong>in</strong> a timely manner, and the resources available.CostIn the matrix, the cost of implement<strong>in</strong>g successful <strong>crime</strong> reduction tactics is classified <strong>in</strong> twoways: firstly <strong>in</strong> terms of how much the measure will cost to implement <strong>in</strong> a f<strong>in</strong>ancial sense;and secondly, how quickly it can be mobilised. Both costs are expressed as either low,medium or high. While a certa<strong>in</strong> measure might be expensive <strong>in</strong>itially, it is essential to look atits cost <strong>in</strong> terms of swiftness of effect. If an <strong>in</strong>tervention can be implemented quickly and <strong>in</strong>those areas identified as be<strong>in</strong>g most at future risk, the potential exists not only to reduceburglary but also to prevent low <strong>crime</strong> areas at a tipp<strong>in</strong>g po<strong>in</strong>t from evolv<strong>in</strong>g <strong>in</strong>to high <strong>crime</strong>areas. Thus, it is crucial to compare both types of cost when decid<strong>in</strong>g what will most likelywork best for the selected pilot site and <strong>in</strong> comb<strong>in</strong>ation with the proposed approach. Perhapsthe optimal solution is offered by the <strong>in</strong>tervention that has a medium f<strong>in</strong>ancial cost butswiftness because it can be mobilised quickly.Geographic coverage of the measuresSituational methods of <strong>crime</strong> prevention work <strong>in</strong> a variety of ways: <strong>in</strong>creas<strong>in</strong>g effort; <strong>in</strong>creas<strong>in</strong>grisks; reduc<strong>in</strong>g rewards; reduc<strong>in</strong>g provocation; and remov<strong>in</strong>g excuses. Once the nature of the<strong>crime</strong> opportunities is identified, then a selection of measures can be made either to block orreduce these opportunities (Clarke, 1997), and these can be applied on at least twogeographic levels: the specific household or the area. Accord<strong>in</strong>gly, each tactical optionoutl<strong>in</strong>ed <strong>in</strong> Table 3.2 is classified as represent<strong>in</strong>g either an area-level or household-specific<strong>crime</strong> prevention measure.Measures that prevent <strong>crime</strong> at an area level will obviously do so by <strong>in</strong>fluenc<strong>in</strong>g risk at thehousehold level, but they may cost more, take longer to implement and will devote resourcesunnecessarily to many households that are <strong>in</strong>dividually at low risk. Conversely, measures thatare extremely effective at the specific household level may have a limited impact across thelarger neighbourhood and thus fail to reduce <strong>crime</strong> on a larger scale if they are focused ononly a subset of those <strong>in</strong>dividually at risk. The ultimate option perhaps is to have acomb<strong>in</strong>ation of both specific and area-level situational measures that are both successful <strong>in</strong>reduc<strong>in</strong>g <strong>crime</strong>, provid<strong>in</strong>g benefits that address specific problems at particularly vulnerablehouseholds, lower the risk of burglary more generally and produce a realisable deterrenteffect.Partners <strong>in</strong>volved and local responsibilitiesThe <strong>in</strong>volvement of police, local partners and <strong>crime</strong> reduction agencies are (<strong>in</strong> currentfashion) important to the success of any <strong>crime</strong> prevention <strong>in</strong>tervention. Multi-agency <strong>crime</strong>reduction has been a political priority for some years and, s<strong>in</strong>ce the Crime and Disorder Act1998 the locally responsible agency is the Crime and Disorder Reduction Partnership (CDRP)rather than the police alone. Table 3.2 shows potential partners such as the police, localauthority and other organisations who could have participated <strong>in</strong> the implementation of thelisted <strong>in</strong>terventions.Putt<strong>in</strong>g together the best tactical options menu can be a difficult process, as the decisiondepends on the available resources as well as the eagerness of police and local partners toget <strong>in</strong>volved. Thus, the aim of the exercise was to <strong>in</strong>form the discussions with the different<strong>crime</strong> reduction agencies that followed.31


Table 3.2: Tactical options matrixType of<strong>in</strong>terventionStudyTargetharden<strong>in</strong>g(victim-centred)Tilley & Webb(1994)CCTVGill et al (2005);Welsh &Farr<strong>in</strong>gdon(2002); Clarke(1997)RedeployableCCTV (RCCTV)Gill et al. (2005);Gill & Spriggs(2005)High visibilitypoliceBlake & Coupe(2001)Street closuresWagner (1997);White (1990);Beavon,Brant<strong>in</strong>gham &Brant<strong>in</strong>gham(1994)Evidence Cost CostDoes itwork?+/ --- / -++/--++DetailsReduces the risk of<strong>in</strong>dividual revictimisationbut may not on its ownaffect area rates.Only likely to impact uponcommercial burglariesand those houses with<strong>in</strong>or very near the areas ofcoverage. Can <strong>in</strong>creasedetectability, act as adeterrent and providereassurance.Limited research suggeststhat while RCCTV allowsflexibility, the system isalso difficult to use andvery sensitive to misuse.No long-term reduction <strong>in</strong><strong>crime</strong> levels.Two-officer patrols havefew advantages overs<strong>in</strong>gle-officer patrols anduse much moreresources.These studies haveshown that there is arelationship betweenstreet access and <strong>crime</strong>rates.F<strong>in</strong>anciallow/med/highCelerityslow/med/swiftSituational<strong>crime</strong>preventionArea orspecificlocationPolicePartners InvolvedLocalAuthorityMultiagencygroupLow-high Swift Specific High Med Area High Swift/med Area Med Swift Area Low Slow Area 32


Type of<strong>in</strong>terventionSecure byDesign,Protect<strong>in</strong>gProperty andtargetharden<strong>in</strong>gbyareaAlley-gat<strong>in</strong>gPropertymark<strong>in</strong>gStudyEkblom (2002);Clarke, (1997);Tilley & Webb(1994)Bowers et al.(2003)Clarke (1997);Laycock (1985)Nelson etal.(2002); Sutton(1998)Evidence Cost CostDoes itwork?+/ --- / -+++/----DetailsDesign<strong>in</strong>g out <strong>crime</strong> is awell established conceptthat has had profoundeffects on reduc<strong>in</strong>g <strong>crime</strong>.The concept of securelydesigned hous<strong>in</strong>g andenvironments is often notdifficult and can beachieved, at the pre-buildstage, for very little extracost.There is good evidenceon the potential benefitsfrom gat<strong>in</strong>g rear alleys asa means of reduc<strong>in</strong>gburglary.This measure reduces theanticipated rewards of<strong>crime</strong> by mak<strong>in</strong>g propertyharder to dispose of.However, any impact islikely to be due toassociated publicity notthe <strong>in</strong>tervention itself.These studies emphasisethat <strong>in</strong> reality, propertymark<strong>in</strong>g does little todeter offenders frombreak<strong>in</strong>g <strong>in</strong>to a house orsteal<strong>in</strong>g marked propertyfrom with<strong>in</strong> it.F<strong>in</strong>anciallow/med/highCelerityslow/med/swiftSituational<strong>crime</strong>preventionArea orspecificlocationLow-med Med Specific &areaPolicePartners <strong>in</strong>volvedLocalAuthorityMultiagencygroup High Med-slow Area Med Swift-Med Specific 33


Type of<strong>in</strong>terventionStudyUse of<strong>in</strong>telligence &target<strong>in</strong>gknownoffendersFarrell et al.(1998);Stockdale &Gresham (1995)PublicitycampaignsStockdale &Gresham(1995); Burrows& Heal (1980);Riley (1980);Johnson &Bowers (2003),see also Smithet al. (2002)RepeatVictimisationStrategiesPease (1998);Forrester et al.(1988); Farrell(2005)R<strong>in</strong>gmaster Lister et al.(2004)Evidence Cost CostDoes itwork?+/ --- / -+DetailsThese studies show thatthe greater use of<strong>in</strong>telligence helped focusresources.F<strong>in</strong>anciallow/med/highCelerityslow/med/swiftSituational<strong>crime</strong>preventionArea orspecificlocationHigh Swift-med Area &specificPolicePartners <strong>in</strong>volvedLocalAuthorityMultiagencygroup +/---Campaigns on their ownrarely change behaviours,although they mayachieve a ‘drip feed’ effectif cont<strong>in</strong>ued over time.Publicity associated with<strong>crime</strong> prevention tacticscan have a <strong>crime</strong>reductive effect of its own.+ Once a property has been+/-burgled its chances ofsubsequent victimisation<strong>in</strong>creases; a gradedresponse model (bronze,silver, gold) has provedeffective.A system that alerts localresidents and voluntarygroups of up-to-date<strong>crime</strong> <strong>in</strong>formation. Whilemany organisationsworried about rais<strong>in</strong>g fearof <strong>crime</strong> among theirclients, they circulated the<strong>in</strong>fo only to front-l<strong>in</strong>e staff.Mixed reviews about thesuccess of thedissem<strong>in</strong>ation of<strong>in</strong>formation.34Med Swift -med Area Med Med Specific Low Med Area


Type ofInterventionNeighbourhoodWatchSchemes &“CocoonWatches”Forensic Traps(i.e. chemicallytreated mats topick up<strong>in</strong>truders footpr<strong>in</strong>ts) & silentalarmsStudyLaycock & Tilley(1995);Forrester et al.(1990)Research todate is limited –Anderson et al.(1995)Does itwork?+/ --- / -Evidence Cost CostDetails+/--- NW has a greater impactwhen residents are homedur<strong>in</strong>g the day. The virtualcocoon that is formed byalert neighbours around theburgled home can <strong>in</strong>creasethe likelihood that anoffender will be caught ifhe/she returns to theproperty. Target cocoonsrather than generalschemes perhaps workbest.--- In relation to burglary ofretail premises both Clarke(2002) and Tilley & Hopk<strong>in</strong>s(1998) emphasise thatthese high-tech devicescan pose numerouspractical problems.Evidence is good on theeffectiveness of silentalarms (Anderson et al.).F<strong>in</strong>anciallow/med/highCelerityslow/med/swiftSituationalCrimePreventionArea orSpecificlocationPolicePartners InvolvedLocalAuthorityMulti-AgencyGroupLow Med Area High Med Specific 35


Other potential tactical optionsAt the time of complet<strong>in</strong>g this phase of the research, the published literature on theeffectiveness of various burglary reduction options/tactics was reviewed. To stimulatealternative ways of th<strong>in</strong>k<strong>in</strong>g, also discussed were tentative suggestions for further tacticswhich may complement the ‘near repeat’ burglary victimisation pattern. Due to thecommunicability of risk <strong>in</strong> time as well as space, mean<strong>in</strong>g that risks surround burgled homesfor a fairly limited time period, many of the suggested measures take exist<strong>in</strong>g technologiesand add a time dimension to them. Note that the redeployable CCTV option outl<strong>in</strong>ed <strong>in</strong> thematrix above, an example of this type of approach, is not without its problems. Theseapproaches would therefore only work <strong>in</strong> a sett<strong>in</strong>g where measures could be relocated swiftly.The proposed measures use the follow<strong>in</strong>g research f<strong>in</strong>d<strong>in</strong>gs:• that risks are concentrated with<strong>in</strong> 400m and one month;• that some areas have particularly high levels of near repeats; and• that near repeats often share MO characteristics (see Bowers and Johnson,2005b)Use of ANPR/surveillance ‘r<strong>in</strong>gs’One possible detection-focused scheme could ‘net’ high risk areas. This could <strong>in</strong>volve amobile r<strong>in</strong>g of covert cameras and/or Automatic Number Plate Recognition (ANPR) devicessurround<strong>in</strong>g the area. Here a burgled house <strong>in</strong> the middle of areas where burglary clusters <strong>in</strong>space and time would be identified and cameras placed around it at a 400m radius. Thisprovides a way of monitor<strong>in</strong>g all entrances and exits to the area for a limited period of time.This is now set up to act a little like a st<strong>in</strong>g operation as the likelihood is that there will befurther activity <strong>in</strong> the area. If a further burglary does happen it should be possible to narrowdown when it occurred, to a reasonable time band at least, by ask<strong>in</strong>g the victim and look<strong>in</strong>g atthe police record. It would then be possible to look at people and vehicles exit<strong>in</strong>g/enter<strong>in</strong>g thearea for a feasible time band dur<strong>in</strong>g which they could have entered the area and conductedthe burglary. With ANPR it would be possible to work with the Driver & Vehicle Licens<strong>in</strong>gAgency (DVLA) to rule out cars that were registered with<strong>in</strong> the area, which would leave asubset of cars to <strong>in</strong>vestigate.Moveable publicityThis would <strong>in</strong>volve the use of offender-orientated publicity. To <strong>in</strong>crease the perceived risks ofcommitt<strong>in</strong>g burglary <strong>in</strong> an area when risk is highest (for perhaps two weeks after an <strong>in</strong>itialburglary), signs could be erected around the boundary of the area with a message <strong>in</strong>dicat<strong>in</strong>gthat people are enter<strong>in</strong>g a high-priority burglary clampdown area. The use of surplus policevehicles parked <strong>in</strong> strategic places (as is sometimes done to deter fill<strong>in</strong>g station drive-offs)would be one available form of publicity.Repeat Victimisation neighbours schemeSimilar to a cocoon-watch approach, this would <strong>in</strong>volve always target-harden<strong>in</strong>g houses acerta<strong>in</strong> number of doors away from a repeatedly burgled home, as well as enhanc<strong>in</strong>g thesecurity of the property itself. It may be that a general publicity campaign describ<strong>in</strong>g the nearrepeatsphenomenon would sensitise otherwise complacent neighbours to take <strong>crime</strong>reduction measures.Targeted, MO-specific <strong>crime</strong> prevention adviceThe same vulnerability is often exploited <strong>in</strong> near-repeat <strong>in</strong>cidents. This means that it ispossible to produce <strong>in</strong>telligence on the likely MOs of future <strong>in</strong>cidents of burglary. This couldbe used as a basis for prioritis<strong>in</strong>g different elements of risk assessments. Crime preventionadvice and assistance would be tailored to MO type and provided to as many nearneighbours of a burgled house as possible. It would (of course) also direct patroll<strong>in</strong>g officersto the part of a home through which entry is most likely to be ga<strong>in</strong>ed.36


Mobile phone cell broadcastCell broadcast is a very rapid way of transmitt<strong>in</strong>g <strong>in</strong>formation to all of the mobile phonehandsets with<strong>in</strong> a particular area of radius. Here, a broadcast would go out to everyone <strong>in</strong> a400m radius of a burgled home as soon as an event occurred. The message would tellpeople to be vigilant as there was a potential risk of burglary. If an offender with<strong>in</strong> the areaowned (or had stolen!) a mobile phone, he/she would also receive the message with apotential deterrent effect.Full forensic exam<strong>in</strong>ation of transient hotspotsNear-repeats are taken to be more often the work of the same offenders than more isolatedevents, and hence more likely to be prolific and persistent. Thoroughness of forensicexam<strong>in</strong>ation should be <strong>in</strong>formed by location with<strong>in</strong> a prospectively identified hotspot.There are strengths, weaknesses and controversies associated with each of the variousoptions suggested above. Furthermore, there is no published evidence on the effectiveness ofthese techniques (although this does not dist<strong>in</strong>guish them from much of what is currentlyattempted). The central po<strong>in</strong>t is that Promap requires reconsideration of polic<strong>in</strong>g tactics, notsuperimposition on them.Emerg<strong>in</strong>g versus endur<strong>in</strong>g risks?F<strong>in</strong>ally, one element of Promap as orig<strong>in</strong>ally conceived, yet to be discussed, is the facility todist<strong>in</strong>guish between areas that are currently at a heightened risk of burglary that have beenfor some time (areas with endur<strong>in</strong>g risks), and those that are currently at an elevated risk butthat have not been <strong>in</strong> the recent past (areas with emerg<strong>in</strong>g or transient risk). In those areaswhich represent endur<strong>in</strong>g hotspots, situational <strong>crime</strong> prevention measures aimed at reduc<strong>in</strong>gopportunities for burglary may be the best core option (e.g. alley-gat<strong>in</strong>g). On the other hand,<strong>in</strong> areas that are currently emerg<strong>in</strong>g as risky, those <strong>in</strong>terventions that can be implementedmost swiftly would be favoured. This may <strong>in</strong>clude targeted police patrols, the use of publicityor deployable CCTV, to name but a few. However, at this stage of the research the CommandTeam and their partners felt that this facility would complicate the pilot and requested that thiselement of the system be developed at a later stage after the pilot, short <strong>in</strong> duration as it was,had run its course.37


4. System development and evolutionBetween the <strong>in</strong>itial stage of the research and implementation the system was developed <strong>in</strong> anumber of ways. First, an opportunity surface, a render<strong>in</strong>g of the spatial distribution andconcentration of houses, was generated and used to weight the predictions generated. AsTable 4.1 reveals, this improved the predictive accuracy of the system considerably. A furtheranalysis showed that for a smaller proportion of the study area (5 per cent) the f<strong>in</strong>al versionaccurately predicted the location of around 60 per cent of burglaries, the retrospectiveapproach just over 40 per cent. Expressed another way, the f<strong>in</strong>al version was able to identifythe same amount of <strong>crime</strong> as the retrospective method, but for a patroll<strong>in</strong>g area of half thesize.Table 4.1 Accuracy of the prospective model <strong>in</strong>clud<strong>in</strong>g the opportunity surface (N=22)Retrospective Promap(specific)Promap (opportunitysurface)2 days 7 days 2 days 7 days 2 days 7 days‘A’ Division 58% 61% 66%+ 66%* 70%* 78%** Significantly better than retrospective method (p


Time of day consistency?As noted above, a further question raised was whether burglaries that occur very close toeach other <strong>in</strong> space and time (with<strong>in</strong> a few days) are committed at the same time of dayusually with<strong>in</strong> the same police shift as each other? The fact that hotspots change accord<strong>in</strong>g toshift (e.g. see Ratcliffe 2002) <strong>in</strong>cl<strong>in</strong>es one to that view, but a more direct test was sought. Anaffirmative set of results would suggest that a burglary not only confers risk for a particulargeography and duration, but also for a specific time of day (morn<strong>in</strong>g, afternoon or even<strong>in</strong>g).To illustrate, consider that an offender might have a preference for certa<strong>in</strong> activities dur<strong>in</strong>g theday (see Rengert and Wasilchick, 2000). Consequently, he/she may visit certa<strong>in</strong> locationsdur<strong>in</strong>g daytime hours. Whilst there, he/she may commit offences if the opportunity presentsitself. This rhythm of activity, if regular enough, means that an offender will be at certa<strong>in</strong>places at certa<strong>in</strong> times. If he/she chooses to commit <strong>crime</strong>s, and <strong>in</strong> particular near-repeats atthese locations, then one would expect to see some consistency <strong>in</strong> the time of day at whichburglaries are committed <strong>in</strong> those areas. Burglars would appear to work shifts.To exam<strong>in</strong>e this hypothesis, one year’s data (January-December 2004) were analysed for thepolice force area (N=8,968). Each <strong>crime</strong> was compared to every other and the number of<strong>crime</strong>s that occurred at different spatial and temporal <strong>in</strong>tervals identified. In l<strong>in</strong>e with theauthors’ earlier work, the spatial <strong>in</strong>tervals here used were multiples of 100m, and the temporal<strong>in</strong>tervals one week periods. Next, all events were compared to see if they occurred dur<strong>in</strong>g thesame police shift (7am to 3pm, 3pm to 10pm, or 10pm to 7am) and a cont<strong>in</strong>gency tablepopulated. Comparisons between events that occurred on the same day as each other wereexcluded from the analyses presented as their <strong>in</strong>clusion has the potential to <strong>in</strong>flate theconsistency observed 3 - as a <strong>crime</strong> series committed dur<strong>in</strong>g one even<strong>in</strong>g would naturally beconsistent <strong>in</strong> terms of the police shift dur<strong>in</strong>g which the events occurred as well as where theyoccurred.To determ<strong>in</strong>e dur<strong>in</strong>g which shift an event occurred, data concerned with the day and time ofeach burglary were analysed. Typically, most burglaries occur when a victim is away from theproperty. Accord<strong>in</strong>gly, rather than record<strong>in</strong>g a s<strong>in</strong>gle time at which a <strong>crime</strong> may have takenplace, the police ask for a likely time w<strong>in</strong>dow, expressed as the earliest time to the latest timethe burglary could have occurred. This was mentioned earlier as a qualification on theanalysis of <strong>crime</strong>s by shift. In the analysis that follows, the midpo<strong>in</strong>t of these two times wasused as an <strong>in</strong>dicator of the time of the event. Crimes were excluded from the analysis if thetime w<strong>in</strong>dow (for the earliest and latest day and times) exceeded 15 hours. Follow-upanalyses used shorter <strong>in</strong>tervals of four and eight hours, and revealed the same pattern ofresults.To determ<strong>in</strong>e whether the emergent patterns differed from what would be expected on thebasis of chance, if the time of day that near-repeat burglaries were committed were unrelated,Monte-Carlo simulation was used to generate a chance distribution. To do this, us<strong>in</strong>g apseudo-random number generator, each <strong>crime</strong> was randomly assigned the police shift for adifferent burglary (each shift was reassigned only once), and a new cont<strong>in</strong>gency tablederived. This was completed 999 times. If the observed results represent a statisticallysignificant pattern, then one would expect that for any space-time comb<strong>in</strong>ation (e.g. eventsthat occurred with<strong>in</strong> 100m and seven days of each other) the number of burglaries for whichthe shifts are concordant would be greater than the Monte-Carlo results for at least 95 percent of the simulations. This equates to a threshold of statistical significance at the five percent level. In this analysis, as so many comparisons were made, the more conservative oneper cent level of statistical significance was adopted.A subset of the results, shown as Figure 4.1, are presented as the ratio of the observednumber of burglary pairs for which the events occurred dur<strong>in</strong>g the same time of day (shift),divided by the mean of the Monte-Carlo simulations. Thus, a value of one would <strong>in</strong>dicate thatthe observed value was equal to that expected. Statistically significant results are highlightedwith exaggerated markers on the graph. The dotted l<strong>in</strong>e shows that for events which occurredbetween 1,000m of each other, the observed number of burglary pairs that occurred dur<strong>in</strong>g3 Analyses which <strong>in</strong>cluded such comparisons produced an identical pattern of results.39


the same time of day as each other was roughly equivalent to what would be expected on thebasis of chance. This likelihood rema<strong>in</strong>s stable irrespective of the number of days betweenevents. In contrast, the time of day at which near repeats (those with<strong>in</strong> 100m for illustration)and repeats proper are committed appears to synchronise with antecedent events with anelevated consistency. This pattern was also evident for events that occurred slightly furtheraway (up to around 400m) for one week after an <strong>in</strong>itial event (for clarity of presentation theseresults are not shown). Generally, the distance over which, and the extent to which,consistency was evident for burglary pairs resembled the pattern observed for thecommunication of risk <strong>in</strong> space and time alone. Thus, there was a pattern of distance decay -events that occurred closest to each other <strong>in</strong> space and time tended to be committed dur<strong>in</strong>gthe same time of day with higher likelihood. This would, therefore, suggest that the time ofday that an <strong>in</strong>itial event is committed offers some additional predictive value beyond thedimensions (days elapsed and distance) from an earlier offence.Figure 4.1: Similarity <strong>in</strong> time of day for near-repeats and unrelated burglariesObserved/Expected Ratio2.001.901.801.701.601.501.401.301.201.101.000.900.800.700.600.500.400.300.200.100.00RV100m1000m7 14 21 28 35 42 49 56 63 70 77 84 91Days between eventsp


The implication of the results is that the generation of three daily forecasts, one for eachpolice shift, should improve the efficiency of resources deployed. Thus, as a f<strong>in</strong>al change tothe system, the predictive model was developed so that it produced different maps for thedifferent shifts, weight<strong>in</strong>g more heavily those events that occurred dur<strong>in</strong>g the same shift asthat for which the prediction was made.ConclusionThe f<strong>in</strong>al Promap system was considerably more accurate than extant methods. The systemwas improved ‘on the hoof’ <strong>in</strong> a number of ways, partly <strong>in</strong> response to requests from thepolice Command Team. Risk<strong>in</strong>g tedious repetition, it must be stressed that the role ofpredictive <strong>mapp<strong>in</strong>g</strong> <strong>in</strong> <strong>crime</strong> reduction is emergent. It provides a tool which may modify policeand Crime and Disorder Reduction Partnerships’ (CDRPs’) practice. There may be falsestarts and <strong>in</strong>itiatives that turn out to be ill-founded. A parallel may be made with cervicalscreen<strong>in</strong>g and PSA (Prostate Specific Antigen) test<strong>in</strong>g for cervical and prostate cancerrespectively. Neither of these approaches affords perfect prediction, but both allow areconsideration of risk assessment and treatment prioritisation for the conditions concerned.The argument is that <strong>crime</strong> reduction is enabled by a more precise specification of risk, butany benefits are cont<strong>in</strong>gent upon the shap<strong>in</strong>g of the craft of polic<strong>in</strong>g to take maximumadvantage of improved prediction.To give the reader an idea of what the GUI looked like, an example screen image is shown asFigure 4.2. As can be seen, the GUI was quite simple but provided some flexibility so that theanalysts could generate different k<strong>in</strong>ds of maps. Appendix 4 provides further detail of thesoftware <strong>in</strong>terface and illustrates how simple it is to use.Figure 4.2: An example image of the f<strong>in</strong>al GUI© Crown Copyright. All rights reserved. Derbyshire Constabulary 100021015.In the Chapters that follow, an account is given of the field trial of the system. Chapter fivediscusses what the police did and problems encountered. To anticipate the f<strong>in</strong>d<strong>in</strong>gs,41


unfortunately, implementation or use of the system was less than desired. As will becomeapparent, this was not because the utility of the system was perceived to be limited (<strong>in</strong> factthe reverse was true), problems associated with us<strong>in</strong>g the system or even a lack ofenthusiasm, but <strong>in</strong>stead largely because polic<strong>in</strong>g priorities changed over the evaluationperiod. This was unavoidable and simply due to the fact that the rate of vehicle <strong>crime</strong><strong>in</strong>creased whilst burglary decl<strong>in</strong>ed.42


5. Process evaluationThe aim of this element of the evaluation was to understand and assess exactly what happened andto identify any factors that particularly facilitated or impeded implementation. For <strong>in</strong>stance, whogenerated the maps, how often, how were they <strong>in</strong>terpreted, who looked at them, were tactics shapedby the results, and if so, how?The reasons for this emphasis are (at least) two-fold. First, this type of analysis is essential if themechanisms through which an <strong>in</strong>tervention worked (or failed to work) are to be identified andunderstood. Given that this project is the first <strong>in</strong> the UK to see if and how police officers can use <strong>crime</strong>forecast<strong>in</strong>g methods <strong>in</strong> an <strong>operational</strong> <strong>context</strong>, this was of particular importance. Consequently, thereis much to be learned not only <strong>in</strong> terms of whether these types of systems could help reduce <strong>crime</strong> butalso <strong>in</strong> terms of how they are received by those who would use them, technical issues that may arise,and how the <strong>in</strong>formation can be usefully dissem<strong>in</strong>ated and <strong>in</strong>terrogated. A particularly poor outcomeof the project would have been to f<strong>in</strong>d that the system was not used but with no account of why thatwas the case. Another undesirable outcome would have been to f<strong>in</strong>d that the system had not beenused for reasons that could have been corrected dur<strong>in</strong>g the implementation phase. The work <strong>report</strong>ed<strong>in</strong> this section sought to preclude such outcomes.The second reason for conduct<strong>in</strong>g the process evaluation was to document how implementationoccurred, who was <strong>in</strong>volved and when, so that <strong>in</strong>telligent replication elsewhere would be plausible, orso that mistakes made could be avoided <strong>in</strong> subsequent projects.Central questions addressed whether or not the police and their <strong>crime</strong> reduction partners used themaps <strong>in</strong> the deployment of <strong>operational</strong> resources and, if so, how? Of course, if the answer to the firstof these questions was ‘no’ then it would not be possible to attribute any <strong>crime</strong> reductive effects to theapproach. Thus, the process evaluation was <strong>in</strong>tegral to, and <strong>in</strong>formed the evaluation of change <strong>in</strong>levels of <strong>crime</strong> that followed. In subsequent sections the approach taken for this element of theevaluation is considered and results discussed.Process evaluation methodologyA variety of measures were used to identify and document the processes through which the pilot wasimplemented. These <strong>in</strong>cluded: semi-structured <strong>in</strong>terviews, a survey of front-l<strong>in</strong>e police officers, thecompletion of a tactical options log by the Command Team, and direct observation by the researchteam. In this section, to provide an overview of the approach taken, each of the different methodsused will first be discussed before discuss<strong>in</strong>g the collective results.The maps were rout<strong>in</strong>ely generated by the two <strong>crime</strong> Intelligence Analysts who worked on theDivision. To ga<strong>in</strong> an understand<strong>in</strong>g of how they perceived the usefulness of the system, both <strong>in</strong> termsof user friendl<strong>in</strong>ess of the software and the maps generated, three semi-structured <strong>in</strong>terviews wereconducted with both analysts at the beg<strong>in</strong>n<strong>in</strong>g, middle and end of the seven-month implementationperiod. The questions asked were divided <strong>in</strong>to two general categories: 1) how useful did they feel themaps were; and, 2) how much did the production of the maps impact on their daily work.Semi-structured <strong>in</strong>terviews were also carried out with 12 Section Sergeants <strong>in</strong> Alfreton, Belper, LongEaton and Ripley towards the end of the pilot period. These were <strong>in</strong>tended to provide an <strong>in</strong>-depthnarrative of how useful, if at all, the maps were to those who used them, and to seek understand<strong>in</strong>g ofhow they were used on a day-to-day basis.At the end of the implementation period, a survey was conducted with 57 front-l<strong>in</strong>e police officers <strong>in</strong> ‘A’Division to help ga<strong>in</strong> an understand<strong>in</strong>g of how useful the officers felt the maps were as well as whether43


any tactical options were employed as a result of the maps. The questionnaires consisted ma<strong>in</strong>ly ofclosed questions, however, there were three open-ended questions which were <strong>in</strong>tended to helpprovide a more complete picture of officers’ feel<strong>in</strong>gs towards the maps. Officers were provided with apaper copy of the questionnaire and reassured that their responses would rema<strong>in</strong> anonymous and notbe provided to the Command Team.To ensure an objective account of how the maps were used on a day-to-day basis, the CommandTeam were asked to fill out a log sheet each time they used the maps. This meant that the tacticaloptions selected by the Command Team as a result of the maps were logged and evidenced on aregular basis.In addition to ask<strong>in</strong>g <strong>crime</strong> analysts and police officers about the project, researchers observed dailybrief<strong>in</strong>g meet<strong>in</strong>gs and tactical assessment and co-ord<strong>in</strong>ation meet<strong>in</strong>gs on three occasions at thebeg<strong>in</strong>n<strong>in</strong>g, middle and end of the implementation period. It was orig<strong>in</strong>ally hoped that these visits couldbe done on a surprise basis to m<strong>in</strong>imise the extent to which demand characteristics came <strong>in</strong>to play.This proved impossible due to the co-ord<strong>in</strong>ation and compliance of key members of the CommandTeam and Intelligence Analysts who required warn<strong>in</strong>g of each visit due to their busy schedules.Rather than present the results collected us<strong>in</strong>g each methodology separately, to avoid repetition, asynthetic approach is taken to help provide a complete picture of how the pilot was implemented, usedand received <strong>in</strong> ‘A’ Division.‘A’ Division, management and day-to-day runn<strong>in</strong>gDerbyshire Constabulary is divided <strong>in</strong>to four Divisions: Alfreton ‘A’, Buxton ‘B’, Chesterfield ‘C’ andDerby ‘D’. With a population of 240,000, ‘A’ Division covers an area of approximately 150 square milesand comprises a number of large towns as well as more remote rural communities. The CommandTeam comprises a small number of key officers <strong>in</strong>clud<strong>in</strong>g the Chief Super<strong>in</strong>tendent andSuper<strong>in</strong>tendent for the Division, who are <strong>in</strong> charge of all Division-level decisions. In addition, the FieldIntelligence Unit and Volume Crime Team also help develop <strong>in</strong>telligence and carry out essential policeoperations and make tactical decisions at a Division level.‘A’ Division is divided <strong>in</strong>to five sections, which comprise a total of 32 beats (with between five andseven <strong>in</strong> each section). Each section has its own Crim<strong>in</strong>al Investigation Department (CID), LocalIntelligence Officer (LIO), Uniformed Officers, and Community Support Officers (CSOs). Pivotal tothese smaller areas are the Section Inspectors and Sergeants who have complete ownership overtheir section <strong>in</strong> terms of task<strong>in</strong>g and co-ord<strong>in</strong>at<strong>in</strong>g their section’s beat team. Each beat has a numberof Beat Officers who are responsible for front-l<strong>in</strong>e police activity and provid<strong>in</strong>g reassurance tomembers of the community.As already discussed, ‘A’ Division is National Intelligence Model compliant.By follow<strong>in</strong>g standards set out by NIM, ‘A’ Division manages <strong>in</strong>telligence us<strong>in</strong>g a structured system ofmeet<strong>in</strong>gs and brief<strong>in</strong>g documents to ensure the dissem<strong>in</strong>ation of knowledge reaches all of the keypeople and is done <strong>in</strong> an efficient way:• Daily Brief<strong>in</strong>gs (daily): short meet<strong>in</strong>gs are held at ‘A’ Division Headquarters, daily at 9:15a.m. andare chaired by a member of the Command Team and held via videoconferenc<strong>in</strong>g across all fivesections. The meet<strong>in</strong>gs are used to discuss current problems and target resources for the dayacross the whole Division.• Section Task<strong>in</strong>g Meet<strong>in</strong>gs (daily, shift by shift): occur on a shift by shift basis (7am, 3pm and11pm) and are chaired by the Section Sergeant <strong>in</strong> charge of that shift. These meet<strong>in</strong>gs are<strong>in</strong>tended to be a quick and efficient way to <strong>in</strong>form and task police officers us<strong>in</strong>g an <strong>in</strong>telligencedocument prepared by the section’s Local Intelligence Officer.44


• Tactical Assessment and Co-ord<strong>in</strong>ation (fortnightly): task<strong>in</strong>g and co-ord<strong>in</strong>ation is an importanttime when the <strong>in</strong>telligence produced by analysts is dissem<strong>in</strong>ated among key officers. Thesemeet<strong>in</strong>gs occur on a fortnightly basis and are attended by the Task<strong>in</strong>g and Co-ord<strong>in</strong>ation Group(<strong>in</strong>clud<strong>in</strong>g key officers such as the Chief Inspector, Section Inspectors, Community Safety Teammembers, and Intelligence Analysts). Chaired by a member of the Command Team, alldepartments and partnership agencies are <strong>in</strong>vited. These meet<strong>in</strong>gs are primarily <strong>in</strong>formed by theTactical Assessment document prepared by analysts. This document conta<strong>in</strong>s details ofsignificant <strong>crime</strong> trends, observations and current issues (<strong>in</strong>telligence and prevention) on anumber of <strong>crime</strong>s as set out <strong>in</strong> the Control Strategy (e.g. violent <strong>crime</strong>, dwell<strong>in</strong>g burglary, andvehicle <strong>crime</strong>). The ma<strong>in</strong> purpose of these meet<strong>in</strong>gs is for key members of the Division to cometogether to discuss pert<strong>in</strong>ent issues that have occurred s<strong>in</strong>ce the previous meet<strong>in</strong>g and targetavailable resources accord<strong>in</strong>gly.• Strategic Assessment (every 6 months): A comprehensive Strategic Assessment document isproduced by analysts every six months. This <strong>in</strong>cludes analyses of any <strong>crime</strong> series, trends andhotspots that have been identified on ‘A’ Division and is discussed among senior rank officers.IT and dissem<strong>in</strong>ationTo m<strong>in</strong>imise disruption to what the police have to do on a day-to-day basis it was important to ensurethat the maps could be generated for, and discussed dur<strong>in</strong>g, the exist<strong>in</strong>g structure of brief<strong>in</strong>gmeet<strong>in</strong>gs. Dur<strong>in</strong>g the first months of implementation, as with any pilot, a number of problems arose.These along with the solutions to them are discussed below.How long did it take the analysts to produce the maps each day?It was decided by the Command Team at an early stage that s<strong>in</strong>ce the two Intelligence Analysts wereusually responsible for the production of Divisional <strong>in</strong>telligence products (<strong>in</strong>clud<strong>in</strong>g maps), they werebest placed to produce prospective maps. Due to data protection issues and other security concerns,the force IT department felt that the Promap software could not be <strong>in</strong>stalled directly onto thenetworked force computers. Instead the software was <strong>in</strong>stalled onto a stand-alone laptop which wouldbe used by the analysts to produce the maps. This was extremely unfortunate as it <strong>in</strong>creased the work<strong>in</strong>volved <strong>in</strong> generat<strong>in</strong>g the maps. It meant that the data required to produce the maps would not bereadily available on the computers used. Thus, each time a new map was produced, the analysts hadto do the follow<strong>in</strong>g:1. extract the data required us<strong>in</strong>g a networked mach<strong>in</strong>e;2. write this to a CD 4 ;3. copy the data onto the laptop;4. produce the maps;5. copy the maps to a CD;6. open the files on the networked computers, and store them <strong>in</strong> the folders allocated to eachsection.This, of course, <strong>in</strong>creased the amount of time required to produce the maps. Had the software been<strong>in</strong>stalled on the networked mach<strong>in</strong>es, steps 2, 3 and 5 would have been redundant. This method ofoperat<strong>in</strong>g should be avoided at all costs <strong>in</strong> any replication as be<strong>in</strong>g immensely wasteful of a skilledhuman resource (for a more detailed discussion of these issues, see Appendix 1). At the start of thepilot, the maps took the analysts up to an hour each to produce. As they became more familiar withthe process <strong>in</strong>volved this decreased significantly, rang<strong>in</strong>g from between 15 and 40 m<strong>in</strong>utes towards4 USB drives were disabled on all force mach<strong>in</strong>es for security reasons.45


the end of the pilot. In addition to produc<strong>in</strong>g the maps, an extra 30 m<strong>in</strong>utes of the analysts’ time wasrequired to enable them to attend the daily meet<strong>in</strong>gs held at 9:15a.m. Their attendance at thesemeet<strong>in</strong>gs was required to ensure that the maps were understood when be<strong>in</strong>g discussed by the seniorofficers, and so that maps could be <strong>in</strong>terrogated <strong>in</strong> some detail if required.Dissem<strong>in</strong>ation of the mapsSome <strong>in</strong>itial concerns arose perta<strong>in</strong><strong>in</strong>g to the practicalities of produc<strong>in</strong>g and dissem<strong>in</strong>at<strong>in</strong>g the maps.These had to be overcome quickly. The ma<strong>in</strong> concern was about how to provide the <strong>in</strong>formation <strong>in</strong> apractical format to those who would use it, as the Section Sergeants, who would ultimately have to<strong>in</strong>spect the maps, were based at different locations.An <strong>in</strong>itial thought was for the Intelligence Analysts to email copies of the maps to the relevant seniorofficer <strong>in</strong> charge of tactical delivery. This proved problematic as not all officers had rout<strong>in</strong>e access toemail. Furthermore, the maps produced required that sufficient memory was available for theirstorage, mak<strong>in</strong>g it difficult to send them as attachments. Other ideas <strong>in</strong>cluded the production of hardcopies of the maps which could be attached to regular brief<strong>in</strong>g documents. This would have beencostly and would have limited the number of different maps that could be generated and the time<strong>in</strong>volved <strong>in</strong> their production.Ultimately, the compromise adopted was for the Intelligence Analysts to produce the maps and thencopy them as jpeg files <strong>in</strong>to each section’s brief<strong>in</strong>g folder, located on the Divisional IT system. Thefolders also conta<strong>in</strong>ed daily brief<strong>in</strong>g documents prepared by the LIOs that all Section Sergeants wereresponsible for, so this ensured that the maps would not be missed. Maps were transferred to thebrief<strong>in</strong>g folders <strong>in</strong> this way from the <strong>in</strong>sem<strong>in</strong>ation of the pilot, <strong>in</strong> August 2005.Once the maps were available, they were accessed <strong>in</strong> two ma<strong>in</strong> ways (see Figure 5.1):(1) If burglary was a particular concern for the Division then a member of the Command Team wouldrequest that the maps be shown dur<strong>in</strong>g the daily brief<strong>in</strong>g meet<strong>in</strong>g at 9:15a.m. where they could directpolice action and tactics to Section Inspectors and/or Sergeants.(2) Section Sergeants who wanted to look at the maps specific to their section could also access themdirectly. Dur<strong>in</strong>g the first few weeks of the pilot, ‘A’ Division <strong>in</strong>vested <strong>in</strong> a videoconferenc<strong>in</strong>g system aswell as plasma screens for each of the five sections. The videoconferenc<strong>in</strong>g system was to be useddur<strong>in</strong>g the daily brief<strong>in</strong>g meet<strong>in</strong>gs to connect all sections, thus elim<strong>in</strong>at<strong>in</strong>g the need for officers to travelfrom their section to Divisional Headquarters. The plasma screens were <strong>in</strong>stalled <strong>in</strong> each section andthis had the advantage that Section Sergeants could also show the maps <strong>in</strong> their shift-specific brief<strong>in</strong>gmeet<strong>in</strong>gs. This enabled all front-l<strong>in</strong>e officers to see the maps and the areas they should be target<strong>in</strong>g.Dur<strong>in</strong>g the pilot period, the Intelligence Analysts and Command Team discovered a problem with themaps produced for the Section Sergeants. The issue was that when produc<strong>in</strong>g the maps, only alimited number could easily be generated for each section due to the time <strong>in</strong>volved, and thus theanalysts had to make a selection based upon their own judgement about what was <strong>in</strong>terest<strong>in</strong>g andwhat was not. Unfortunately, as the software was not <strong>in</strong>stalled on the force IT system, the SectionSergeants could not themselves <strong>in</strong>terrogate the maps if they wanted to take a closer look at thepattern of risk with<strong>in</strong> a particular area, or if they wanted to ‘zoom’ <strong>in</strong>to a particular location. Nor couldtime be devoted to tak<strong>in</strong>g a closer look at each map for every section dur<strong>in</strong>g the daily meet<strong>in</strong>gs. Theresult<strong>in</strong>g difficulty was that when a particular Section Sergeant felt that burglary was a problem andwanted to look at the maps <strong>in</strong> some detail, only a partial picture of the problem might be available. Thesolution to this difficulty was to provide a version of the Promap software to each section. Thus, a newversion of the software was developed that could be used by the LIOs <strong>in</strong> each section. Rather thanhave each section produce their own maps, which would have required them to download new dataeach day and then generate the maps, the analysts cont<strong>in</strong>ued to process the data with their software.However, <strong>in</strong>stead of just provid<strong>in</strong>g the sections with jpeg images of the maps, they were now able to46


export the maps themselves, which could then be <strong>in</strong>terrogated <strong>in</strong> detail by the Section Sergeantsus<strong>in</strong>g the software provided. Consequently, the Intelligence Analysts tra<strong>in</strong>ed each LIO to use thesoftware once they had acquired the relevant equipment, <strong>in</strong> this case laptops. Unfortunately, due tologistical issues <strong>in</strong>volved <strong>in</strong> acquir<strong>in</strong>g the laptops, this did not take place until the end of December <strong>in</strong>two sections and the end of January <strong>in</strong> the other three. Thus, this solution was not fully realised untilvery late <strong>in</strong> the pilot period. Figure 5.1 illustrates this method of dissem<strong>in</strong>ation.A fourth method of dissem<strong>in</strong>ation was through the fortnightly tactical assessment and co-ord<strong>in</strong>ationmeet<strong>in</strong>gs. The maps were used dur<strong>in</strong>g these sessions if, and only if, the Command Team felt thatburglary had been a significant concern over the last two weeks. These meet<strong>in</strong>gs allowed for afocused discussion of the maps and potential tactical options that could be used <strong>in</strong> the identifiedareas. One such response that evolved <strong>in</strong> January 2006 was that of a collaboration between theCommunity Safety Team who worked with the Division to organise and implement a promap-specifictargeted operation. The operation was <strong>in</strong>tended to provide high visibility polic<strong>in</strong>g and <strong>crime</strong> reductionmeasures to the areas identified through Promap, with the <strong>in</strong>tention of:• <strong>in</strong>creas<strong>in</strong>g public awareness around home security and property mark<strong>in</strong>g; and• <strong>in</strong>creas<strong>in</strong>g neighbourhood watch schemes <strong>in</strong> priority areas.This <strong>in</strong>volved the co-ord<strong>in</strong>ation of the Divisional Community Safety Unit and all sections. To elaborate,on days that the maps were produced (i.e. Mondays and Thursdays) one Section Beat Officer and oneCommunity Safety Constable would use the Mobile Police Station (i.e. a marked police van) with the<strong>in</strong>tention of target<strong>in</strong>g identified hotspots <strong>in</strong> two ways: firstly by provid<strong>in</strong>g a high visibility presence todeter potential offenders; and secondly to <strong>in</strong>crease public awareness visit<strong>in</strong>g residential premises <strong>in</strong>the identified areas giv<strong>in</strong>g out <strong>crime</strong> reduction advice, mak<strong>in</strong>g home security assessments whereneeded, referrals to other agencies and consider<strong>in</strong>g whether a neighbourhood watch scheme wouldbe appropriate for the identified area(s). It was felt by ‘A’ Division as well as the research team thatthis collaboration was a success <strong>in</strong> its own right as it helped improve the already good relationshipbetween the Community Safety Unit, community partners and front-l<strong>in</strong>e Beat Officers.47


Figure 5.1: Promap dissem<strong>in</strong>ation process across ‘A’ Division (squares shaded grey were present throughout the pilot while squares <strong>in</strong> white were onlyadded to the dissem<strong>in</strong>ation process dur<strong>in</strong>g the f<strong>in</strong>al two months of the pilot)Intelligence AnalystsProduce maps and put them <strong>in</strong>network Divisional Section folders41 2 3Task<strong>in</strong>g and Co-ord<strong>in</strong>ationIf burglary is of considerableconcern, maps are discussedwith key officers and partnersand <strong>operational</strong> tactics aredecided uponDaily Meet<strong>in</strong>gs (‘daily prayers’)The Command Team decidewhether or not the maps should beshown dur<strong>in</strong>g the meet<strong>in</strong>g. If theyare, any tactics that evolve from themaps are discussed and plannedSection Sergeants (daily shiftmeet<strong>in</strong>gs)Section Sergeants responsiblefor access<strong>in</strong>g the maps anddecid<strong>in</strong>g whether or not to usethem for targeted police activitySection LIOsResponsible for navigat<strong>in</strong>g themaps with the Section laptops.This is dependent on Sectionspecific problem areasCommunity Safety TeamHave the potential to use the<strong>in</strong>formation discussed around themaps to deliver tactics, e.g. giv<strong>in</strong>g<strong>crime</strong> prevention advice toresidents <strong>in</strong> Promap identifiedhotspotsSection Inspectors andSergeantsResponsible for implement<strong>in</strong>gthe tactical options with frontl<strong>in</strong>e officersBeat OfficersResponsible for carry<strong>in</strong>g outany tactical options <strong>in</strong> responseto the maps48


How often were the maps produced?From the beg<strong>in</strong>n<strong>in</strong>g of the pilot (15 August 2005) and up until 4 September 2005, the maps wereproduced five times a week (Monday to Friday). However, produc<strong>in</strong>g the maps five days a week had anumber of disadvantages. Most important, the areas identified as be<strong>in</strong>g most at risk did not alwayschange significantly from day to day. In reality, the pattern from one day to the next would not betotally stable, but would be serially correlated. Thus, some areas identified as be<strong>in</strong>g at a high risk onone day would most likely be at high risk the next day, and possibly the day after that. The reason forthis is that the data used to generate the predictions would be similar from one day to the next,reflect<strong>in</strong>g the activity of offenders. The exception would be dur<strong>in</strong>g periods of time when a large volumeof offences takes place each day. In this case, the predictions would vary considerably from one dayto the next. However, even when the daily volume of <strong>crime</strong> was low, as a few days pass thepredictions would change, keep<strong>in</strong>g pace with the flux of <strong>crime</strong>. Nevertheless, it is possible thatview<strong>in</strong>g the maps one at a time, on sequential days, may have created an illusion of stationarity. Afterall, to detect differences <strong>in</strong> the maps each day officers would have to remember the exact locationsidentified from one day to the next, and human memory and perceptual systems are known to besusceptible to distortion. To illustrate, a series of predictions are shown <strong>in</strong> Figure 5.2. Thesepredictions were generated for one area every Monday for a period of four sequential weeks. As canbe seen, <strong>in</strong> some areas the risks are relatively stable, but elsewhere more fluid. Detect<strong>in</strong>g thechanges, <strong>in</strong>stead of be<strong>in</strong>g deceived by an illusion of stationarity, requires one to look quite carefully.For example, the reader is <strong>in</strong>vited to look at the pattern from week to week <strong>in</strong> the centre of the map.This area always has some degree of risk associated with it, but the areas shaded <strong>in</strong> the darkestshade (blue for those with <strong>in</strong>tact colour perception and a colour version of the <strong>report</strong>) clearly move. Infact the blue areas always move at the level of resolution at which polic<strong>in</strong>g tactics would be deployed,but a glance at the map may suggest stability. Thought should be given to modes of depiction of mapswhich highlight change.Figure 5.2: A series of predictions for one area (blue areas are those most at risk)Further concerns about generat<strong>in</strong>g the maps each day arose because it was felt that they would notbe taken seriously if officers were forced to look at them five days a week, on top of all the other<strong>in</strong>telligence that they had to assimilate. Over exposure to the maps might mean that officers wouldlose <strong>in</strong>terest. For these reasons, it was decided that from 5 September 2005 the maps would beproduced three times a week (Monday, Wednesday and Friday). Dur<strong>in</strong>g the next six weeks the projectreceived a lot of positive reception from the officers and seemed to be used regularly. However, fromNovember onwards the residential burglary numbers dropped further and, consequently, officersperceived that the three maps produced each week were beg<strong>in</strong>n<strong>in</strong>g to look similar to each other.Consequently, the Command Team decided that at this po<strong>in</strong>t the maps would be produced twice aweek (Mondays and Thursdays). If, however, the analysts felt that there was a significant concernregard<strong>in</strong>g residential burglary and that produc<strong>in</strong>g the maps more than twice a week would be helpful,they were free to do so, and did on a number of occasions. Maps were produced twice a week from14 November 2005Tim<strong>in</strong>g issuesUnfortunately, the pilot got off to a false start because of a number of fundamental tim<strong>in</strong>g issues. First,the Divisional Commander, who had been extremely supportive and helpful dur<strong>in</strong>g the plann<strong>in</strong>g stagesof the pilot and who was <strong>in</strong>strumental <strong>in</strong> secur<strong>in</strong>g ‘A’ Division as the pilot site, received a promotionand left the Division <strong>in</strong> August. As is the way, there was no advance warn<strong>in</strong>g that this would happenand thus appropriate measures could not be taken to m<strong>in</strong>imise the impact this had on the pilot. Due to49


the busy schedule of the new Divisional Commander, the research team was unable to meet with andbrief him on the project until the end of October, nearly two and a half months <strong>in</strong>to the pilot.Furthermore, key members of the Command Team had arranged annual leave and were unavailabledur<strong>in</strong>g the early days of the project period. Dur<strong>in</strong>g the first meet<strong>in</strong>g that could be arranged post-August, it was revealed that <strong>in</strong>stead of us<strong>in</strong>g the predictive capability of the maps, when the mapswere used, attention was <strong>in</strong>stead focused on the locations of burglaries that had occurred with<strong>in</strong> thelast two weeks, the approach that had previously been used on the Division (and the approach thatPromap outperformed and was designed to replace). The reason for this was that it was felt that theareas identified as be<strong>in</strong>g at risk were too large. Consequently, the software was further ref<strong>in</strong>ed togenerate predictions for smaller areas.As a result of these factors, summarised <strong>in</strong> Figure 5.3, it took a few months for the system to be f<strong>in</strong>etunedand for the Command Team members to unite to give Promap a high profile across the Division.Because the pilot was only seven months <strong>in</strong> duration and almost three months had elapsed before themaps were be<strong>in</strong>g produced <strong>in</strong> the way <strong>in</strong>tended, it was not implemented over a sufficient period to fulfilits potential. As will become apparent, the pilot expired just when it was becom<strong>in</strong>g accepted andunderstood across the Division.User-friendl<strong>in</strong>ess and impact on workloadGenerally, the Intelligence Analysts found the maps easy to produce, however, they voiced the op<strong>in</strong>ionseveral times throughout the pilot that hav<strong>in</strong>g the system on the Divisional network could havesignificantly improved the ease of produc<strong>in</strong>g the maps. More automation of the process would havealso reduced the time and effort <strong>in</strong>volved. For example, the analysts regularly spent time manuallyremov<strong>in</strong>g distraction burglaries from the dataset (as they felt that these burglaries would conform todifferent patterns and trends than other residential burglaries, although this is an empirical questionworth address<strong>in</strong>g). Only approximately 80 per cent of the data were automatically geo-coded by theforce IT system, and hence the analysts had to spend time manually geo-cod<strong>in</strong>g the rema<strong>in</strong>der. Ofcourse, these issues are germane to the force IT system rather than the Promap software. However,they are worth not<strong>in</strong>g as it is likely that similar issues may arise <strong>in</strong> other police force areas.Despite these issues, the analysts did not feel that the maps impacted greatly on their day-to-daywork. In some cases, where they were specifically responsible for summaris<strong>in</strong>g a burglary problem(e.g. produc<strong>in</strong>g a problem profile or a specific task<strong>in</strong>g document), they <strong>report</strong>ed that the system helpedto illustrate patterns and trends they felt would not otherwise have been considered. The onlysignificant effect that the production of the maps had on the Intelligence Analysts was their start<strong>in</strong>gtime at work. Because the maps had to be available to discuss <strong>in</strong> the daily brief<strong>in</strong>g meet<strong>in</strong>g at9:15a.m., the analysts had to ensure they were at work by 8a.m. By the end of the pilot, each analystwas only produc<strong>in</strong>g the maps once a week, and so the time <strong>in</strong>volved was not a considerable<strong>in</strong>convenience.50


Figure 5.3: Timel<strong>in</strong>e for <strong>Prospective</strong> Mapp<strong>in</strong>g Pilot <strong>in</strong> ‘A’ Division (August 2005 – March 2006)Mid-End Aug• Several of the Command Teammembers on leave <strong>in</strong> August15 Aug• Official start date5 Oct• Maps stopped be<strong>in</strong>g produced 5 times/wk (M-F) and wereproduced 3 times/wk (M, W & F)End Aug• DivisionalCommander JohnWright left ‘A’Division26 Oct• Evaluation visit #1• Meet<strong>in</strong>g to <strong>in</strong>form new Divisional Commanderof project1 Nov• Analyst <strong>in</strong>terviews #123 Dec• Laptops collectedby Alfreton andBelper (LIOsshown how to usePromap)20 Feb – 3 Mar• A Researcher from the Home Office<strong>in</strong>terviewed four Section Sergeants (all butIlkeston)8, 9 Mar• Analyst <strong>in</strong>terview #3 (Deborah Rimell)• Community safety team (90 packs)18 Jan• Evaluation visit #2• Analyst <strong>in</strong>terviews #220 Mar• Community Safety Team (45 packs)28 Feb• Official end date of pilotAug-05 Sep-05 Oct-05 Nov-05 Dec-05 Jan-06 Feb-06 Mar-0617 Aug• Retrospectivepo<strong>in</strong>ts shown onmaps28 Oct• Retrospectivepo<strong>in</strong>ts nolonger shownon maps14 Nov• Maps produced 2times/wk Mon & Thurs4 Nov Consensus by the steer<strong>in</strong>g group thatmaps will now be produced 2 times/wk(Mon and Thurs)51End Jan• Laptopscollected byLong Eaton,Ripley &Ilkeston19 and 23 Jan• Community Safety Team proactive patrol,hand<strong>in</strong>g out door-to-door <strong>in</strong>fo packs (70and 35 packs handed out)1, 2 Mar• Evaluation visit #3• Analyst <strong>in</strong>terview #3 (Bill Wallage)• Promap survey (57 officers)• Community Safety Team (100 packs)


Tactical deliveryCommand Team daily brief<strong>in</strong>g (9:15am)As described above, prospective maps were shown and discussed at the daily brief<strong>in</strong>gmeet<strong>in</strong>gs if the Command Team felt they would be a valuable addition to the meet<strong>in</strong>g. Ifburglary numbers had been sufficiently low for the past few days, then the maps were usuallynot shown. Table 5.1 shows the number of times that prospective maps were used <strong>in</strong> the dailybrief<strong>in</strong>g meet<strong>in</strong>gs from <strong>in</strong>itial implementation to the end of the evaluation period. Numbersdecreased dramatically towards the latter months because burglary numbers were fall<strong>in</strong>g soconsiderably, and Divisional priority had been shifted to deal<strong>in</strong>g with auto-<strong>crime</strong> which roseover the same period.Table 5.1: Number of times prospective maps were used <strong>in</strong> ‘A’ Division’s daily brief<strong>in</strong>gNumber of times prospectivemaps were used <strong>in</strong> dailybrief<strong>in</strong>gsAUG 05 6SEP 05 8OCT 05 8NOV 05 4DEC 05 1JAN 06 2FEB 06 1Total 30Accord<strong>in</strong>g to the tactical logs completed by the Command Team, of the 30 times prospectivemaps were used <strong>in</strong> daily brief<strong>in</strong>gs, tactics were employed as a result of the maps 27 timesacross the Division. The most common tactics employed <strong>in</strong> response to the maps were footpatrols, drive-through patrols <strong>in</strong> hotspot areas and the target<strong>in</strong>g of known offenders believedto operate <strong>in</strong> or nearby the areas identified.Section front l<strong>in</strong>e responseOn 2 March 2006 a survey was conducted with 57 officers across all sections to assess theirlevel of knowledge and understand<strong>in</strong>g of Promap as well as to identify any factors that mayhave either facilitated or impeded implementation. A copy of the questionnaire used isprovided as Appendix 2. Table 5.2 provides a breakdown of the sample of officers surveyedacross the Division.52


Table 5.2: Sample characteristicsNumber %SexRankTime <strong>in</strong> RankSectionMale 42 73.7Female 15 26.3PoliceConstable49 86.0Sergeant 6 10.5Inspector 1 1.8SpecialConstable1 1.8Less than 1year6 10.51-5 years 30 52.6More than 5years20 35.1No answer 1 1.8Alfreton 9 15.8Belper 13 22.8Ilkeston 15 26.3Long Eaton 12 21.1Ripley 8 14.0Table 5.3 shows the number of respondents who had heard of prospective <strong>mapp<strong>in</strong>g</strong>, bysection. In all sections, aside from Ilkeston, the majority of respondents had heard of Promap.In Ilkeston, only four of the fifteen respondents <strong>in</strong> that section, had heard of the pilot. 5 Thosewho had heard of Promap were asked how they would def<strong>in</strong>e Promap <strong>in</strong> their own words.Two researchers, one who did not work on the project and one who did, exam<strong>in</strong>ed theresponses to ensure that there was no bias of <strong>in</strong>terpretation. The <strong>in</strong>ter-rater reliability for thetwo researchers was high (Cronbach’s Alpha=0.99) and thus the cod<strong>in</strong>g appropriate. 52 percent (21) correctly identified the def<strong>in</strong>ition of Promap, i.e. the maps ‘predict where burglariesare likely to occur’. Those that did not provide an accurate def<strong>in</strong>ition showed a basicunderstand<strong>in</strong>g of the system (e.g. ‘shows burglary hotspots’ and ‘shows <strong>crime</strong> hotspots’). Afew respondents, 21 per cent (8) did not fully understand the maps as they thought that theyillustrated both burglary and auto <strong>crime</strong> hotspots.5 It was suggested by a member of the Command Team that one possibility why the number of respondents is so lowis because of the term<strong>in</strong>ology used <strong>in</strong> the questionnaires. It seems that the Division was us<strong>in</strong>g the term ‘JDI maps’when referr<strong>in</strong>g to the pilot, whereas the questionnaire specifically asked if respondents had heard of ‘<strong>Prospective</strong>Mapp<strong>in</strong>g’. One would assume that if this were the case, however, that the same trends would have been evident <strong>in</strong>the other four Sections.53


Table 5.3: Number of respondents who had heard of prospective <strong>mapp<strong>in</strong>g</strong>, by sectionSection Yes No No, b/c newTotalstarterAlfreton 88% (8) 12% (1) 0% (0) 16% (9)Belper 92% (12) 8% (1) 0% (0) 23% (13)Ilkeston 27% (4) 73% (11) 0% (0) 26% (15)LongEaton83% (10) 17% (2) 0% (0) 21% (12)Ripley 75% (6) 12% (1) 12% (1) 14% (8)Total 70.2% (40) 28.1% (16) 1.8% (1) 100.0% (57)When asked how frequently the maps were rout<strong>in</strong>ely used for targeted police activity, officers<strong>report</strong>ed us<strong>in</strong>g them with different frequencies. Table 5.4 shows that around 30 per cent<strong>report</strong>ed us<strong>in</strong>g them more than twice a week, and a similar proportion <strong>report</strong>ed that theirsupervisors had used them at this rate. Follow-up <strong>in</strong>terviews with the Section Sergeants, theLIOs and the analysts suggested that this had been the case when burglary was a priority, butthat, understandably, the maps were used significantly less when it was not. The generalperception, which is corroborated by the records from the tactical options log, was that themaps were used more dur<strong>in</strong>g the first few months of the pilot when burglary was more of apriority 6 , although the maps were still produced and dissem<strong>in</strong>ated throughout the pilot periodtwice a week thereafter.Table 5.4: Number of times maps were used for targeted police activityNumber of timesofficers usedprospectivemaps(s) fortargeted policeactivityNumber of times officers’supervisors usedprospective map(s) fortargeted police activityMore than twice a21% 21%weekTwice a week 9% 11%Once a week 11% 11%Once every two4% 4%weeksOnce every three0% 2%weeksLess than once a5% 2%monthDon't know 0% 2%No answer 27% 47%6 Unfortunately, this was when the maps produced reflected retrospective po<strong>in</strong>t maps rather than predictive surfaces.54


Table 5.5 shows the number of tactics <strong>report</strong>ed to have been used <strong>in</strong> response to theprospective maps when they were used. Those most commonly used were drive-throughpatrols <strong>in</strong> identified areas, foot patrols and the target<strong>in</strong>g of offenders known to operate <strong>in</strong> oraround the areas highlighted <strong>in</strong> the maps.Table 5.5: Number of respondents who were either <strong>in</strong>volved <strong>in</strong> or responsible foremploy<strong>in</strong>g <strong>operational</strong> tactics, by sectionTactic either employed or<strong>in</strong>volved <strong>in</strong> Alfreton BelperLongEaton Ripley Ilkeston TotalDrive-through patrols <strong>in</strong> hotspots 6 6 6 4 2 24Foot patrols around hotspots 5 5 1 3 1 15Target<strong>in</strong>g known offenders 1 3 4 3 0 11Repeat victimisation strategies 0 1 3 1 0 5Target-harden<strong>in</strong>g 1 1 1 1 0 4Publicity campaigns 2 0 0 0 1 3Redeployable CCTV 0 0 1 1 0 2Crime prevention advice given 0 0 1 0 0 1As noted, officers were sometimes tasked to target known offenders, and although this issometh<strong>in</strong>g they have always done, it was suggested by some that the prospective maps hadhelped them comb<strong>in</strong>e the <strong>in</strong>telligence gathered on offenders by Intelligence Analysts andLIOs with the identified areas, provid<strong>in</strong>g an overall enhanced tactical option for catch<strong>in</strong>goffenders. In one case, one officer mentioned that “I can’t give names or give numbers but it’s[offenders who have been caught have been l<strong>in</strong>ked back to certa<strong>in</strong> areas that were identifiedby the maps] certa<strong>in</strong>ly happened a few times”. Repeat victimisation strategies are apparentlycommonly used on ‘A’ Division, regardless of Promap; however, one Section Sergeant <strong>in</strong>Long Eaton mentioned that he tasked officers to revisit burgled properties to give out <strong>crime</strong>prevention advice and this would often be done <strong>in</strong> areas identified by the maps. Targetharden<strong>in</strong>g also is someth<strong>in</strong>g that is normally done on the ‘A’ Divisions; it is part of theDerbyshire Constabulary bus<strong>in</strong>ess plan. This <strong>in</strong>volves a Crime Prevention Officer visit<strong>in</strong>g localresidents and offer<strong>in</strong>g <strong>crime</strong> prevention advice and advice on hav<strong>in</strong>g security measures fitted.If the householder wishes to have security measures <strong>in</strong>stalled, the <strong>crime</strong> prevention officercan arrange for this. Although respondents from each of the sections mentioned that theyused target-harden<strong>in</strong>g <strong>in</strong> response to the maps, when speak<strong>in</strong>g to the Sergeants <strong>in</strong> each ofthe sections, they mentioned that target-harden<strong>in</strong>g was a tactic that has always been used onthe Division, regardless of Promap and thought that perhaps the respondents had recalledbe<strong>in</strong>g <strong>in</strong>volved <strong>in</strong> target-harden<strong>in</strong>g prior to fill<strong>in</strong>g out the survey and thus had misconstruedus<strong>in</strong>g the tactic as a result of the pilot. This, of course, serves to illustrate the importance oftriangulat<strong>in</strong>g evidence from different sources when complet<strong>in</strong>g a process evaluation.Although it was decided by the Command Team <strong>in</strong> October 2006 that it did not wish to launchany publicity campaigns <strong>in</strong> response to the pilot for fear of frighten<strong>in</strong>g local residents, somesections chose to put short press releases <strong>in</strong> their local paper(s) alert<strong>in</strong>g residents to ‘takecare’ and make sure their property is safe and offer<strong>in</strong>g <strong>crime</strong> prevention advice. However,this form of publicity was not specific to the project, even if it was evoked by it.A f<strong>in</strong>al aspect of police work<strong>in</strong>g that was not highlighted <strong>in</strong> the survey, but came up a fewtimes when <strong>in</strong>terview<strong>in</strong>g Section Sergeants and LIOs, concerned the plann<strong>in</strong>g of ‘night-timepatrols’. Accord<strong>in</strong>g to Sergeants <strong>in</strong> Alfreton, Long Eaton and Ripley, when resources55


permitted, up to four pla<strong>in</strong> clothed officers were deployed at night and patrolled those areasidentified by the prospective maps. This tactic was usually done at night because the nightshift is often slow mov<strong>in</strong>g. Consequently, there are fewer calls for Beat Officers to respond tocompared to shifts dur<strong>in</strong>g other times of the day, which frees up available resources forproactive patrols. Although it was not possible to enumerate the frequency with which nighttimepatrols were <strong>in</strong>formed by the predictions generated, this does illustrate that whenresources were available and burglary was a priority, police officers used Promap for <strong>crime</strong>prevention and detection purposes.As previously mentioned, dur<strong>in</strong>g the f<strong>in</strong>al few months of the pilot, and dur<strong>in</strong>g March (onemonth after the end of the pilot), the Community Safety Unit deployed a mobile police vehicle<strong>in</strong> the hotspot areas designated by the maps and distributed residential burglary <strong>crime</strong>prevention packs door-to-door <strong>in</strong> the areas identified as be<strong>in</strong>g at the most risk. The dates onwhich, and the number of packs distributed were as follows:• 19 January: 70 packs;• 23 January: 35 packs;• 2 March: 100 packs;• 9 March: 90 packs;• 20 March: 45 packs.Usefulness of mapsAs can be seen from Table 5.6, 87.5 per cent of the sample who had heard of the pilot foundthat prospective maps were either easy or fairly easy to <strong>in</strong>terpret, whereas only 12.5 per centfound the maps to be either fairly difficult or difficult to <strong>in</strong>terpret. In terms of how useful officersfound the maps to be, although 67.5 per cent of the sample found the maps to be either veryor at least somewhat useful, 32.5 per cent (10) found them not to be very useful. Similarly,when asked whether or not the maps identified risky areas that respondents would have nototherwise have considered risky, 47.5 per cent (19) of the sample felt that the maps ‘never’identified unknown risky areas, whereas 42.5 per cent (17) felt that the maps ‘sometimes’identified risky areas that they would not have otherwise considered as such. In relation tothis po<strong>in</strong>t, research conducted by the authors of this <strong>report</strong> (McLaughl<strong>in</strong> et al., 2006)demonstrates that whilst police officers often have a good impression of where burglarygenerally occurs, they are less accurate at identify<strong>in</strong>g where it recently took place. Theimplication is that they are unlikely to be able to anticipate where it will next occur. Moreover,<strong>in</strong>terviews with LIOs and the analysts, suggested that although the maps often identifiedpriority areas <strong>in</strong> known risky neighbourhoods, the precise location or tim<strong>in</strong>g of elevations <strong>in</strong>risk were not always expected.Table 5.6: The <strong>in</strong>terpretation and usefulness of prospective mapsNumber %Interpretation of mapsEasy 10 25.0Fairly easy 25 62.5Fairly difficult 4 10.0Difficult 1 2.5Usefulness of mapsVery useful 4 10.0Somewhat useful 23 57.5Not very useful 10 25.0Not useful 3 7.556


In addition to the questions discussed above, survey respondents were asked two openendedquestions to canvass any thoughts not captured by the closed questions asked. Firstly,they were asked to outl<strong>in</strong>e any extra comments that they might have about the usefulness ofthe maps and how they might be improved. Secondly, respondents were asked to outl<strong>in</strong>eextra comments about their knowledge and understand<strong>in</strong>g of prospective maps and anytactical options that they had employed. To be frank, on the basis of experience the authorshad expected negative feedback <strong>in</strong> response to these questions. Instead, few chose torespond. Of those that did, 27.5 per cent (11) commented on how the maps could beimproved, for example three suggested that:“the colour of the hotspots should be red not blue”;one suggested that:“the maps are too simplistic and should show MO, po<strong>in</strong>t of entry, class etc.”Perhaps surpris<strong>in</strong>gly only two op<strong>in</strong>ed that:“the maps don’t tell me anyth<strong>in</strong>g that I did not already know”.In terms of extra comments about police officers’ knowledge and understand<strong>in</strong>g of Promap,only four made comments, with one ask<strong>in</strong>g“how accurate are the maps?” and another suggest<strong>in</strong>g that“the maps are good for support<strong>in</strong>g <strong>in</strong>formation for patrol strategies”.Although the official end-date of the pilot was the end of February 2006, the maps are stillbe<strong>in</strong>g produced on a biweekly basis to <strong>in</strong>form tactical delivery. Moreover, the CommandTeam have decided to use the system more frequently if the rate of burglary <strong>in</strong>creases andthe priority returns to this type of <strong>crime</strong>.SummaryAs already discussed, dur<strong>in</strong>g the fist two to three months of the pilot, rather than us<strong>in</strong>g thepredictive capability of the system developed, p<strong>in</strong> maps show<strong>in</strong>g the locations of recent <strong>crime</strong>patterns were used. This was unfortunate as it was <strong>in</strong> conflict with what Promap wasdesigned to achieve - accurate predictions of the future locations of burglaries for those as yetunvictimised (as well as repeat victims).Despite this and some <strong>in</strong>itial negativity towards the approach, there now seems to be amoderate to high level of acceptance of the maps and the Division has embraced the systemas a useful tool. Unfortunately, dur<strong>in</strong>g the pilot period there was a substantial <strong>in</strong>crease <strong>in</strong> theftfrom vehicles across the Division (and elsewhere <strong>in</strong> Derbyshire) <strong>in</strong> October which wasco<strong>in</strong>cident with a reduction <strong>in</strong> burglary. Consequently, there was a shift <strong>in</strong> polic<strong>in</strong>g priority atthis time towards vehicle <strong>crime</strong> across the Division. The problem with this <strong>in</strong> terms of theevaluation was that it meant that less time was focused on burglary, and the application of thePromap system. In short, this precludes a fair evaluation of the impact on <strong>crime</strong> of Promap.Nevertheless, given that this is the first attempt to implement such a system <strong>in</strong> the UK, it is anon-trivial f<strong>in</strong>d<strong>in</strong>g to be able to say that feedback from those us<strong>in</strong>g the system has been onthe whole very positive. In fact, most of those <strong>in</strong>terviewed, formally or otherwise, havesuggested that should burglary <strong>in</strong>crease <strong>in</strong> the future they would use the system to tackle theproblem, which <strong>in</strong> itself illustrates the utility of the system as perceived by those who wereexposed to it. In l<strong>in</strong>e with this observation, despite the fact that the pilot has come to an endand that burglary cont<strong>in</strong>ues to rema<strong>in</strong> low with<strong>in</strong> the Division, at present the maps are stillgenerated every two weeks to <strong>in</strong>form the task<strong>in</strong>g and co-ord<strong>in</strong>ation meet<strong>in</strong>gs. A further57


observation made by those who used the system was that when used it helped to focus theirattention on the problem and how they might reduce it.As a further testament to police officer acceptance of the usefulness of the system, a numberasked if it could be used to predict <strong>in</strong>cidents of vehicle <strong>crime</strong>. S<strong>in</strong>ce complet<strong>in</strong>g the pilot, it hasbeen shown (Johnson et al., 2006) that patterns of theft from motor vehicle (TFMV) conformto the same spatial and temporal patterns as burglary and hence the answer to this questionis likely to be yes. Thus, an anticipated future development of the system would be to facilitatepredictions of TFMV also.Thus, from the perspective of the evaluation, the pilot served to demonstrate police officeracceptance of, and confidence <strong>in</strong>, the system, and to show that it could be used <strong>in</strong> an<strong>operational</strong> sett<strong>in</strong>g without disrupt<strong>in</strong>g other activity. Important lessons were learned <strong>in</strong> relationto the dissem<strong>in</strong>ation of the maps. Initially, it was thought that the analysts could generate anddistribute the maps, with Section Sergeants hav<strong>in</strong>g only to look at the output. However, it wassoon felt that the sections would benefit from be<strong>in</strong>g able to <strong>in</strong>terrogate and navigate the mapsthemselves, thereby allow<strong>in</strong>g them to ga<strong>in</strong> a more detailed picture of the problem. Thesolution to this problem was straightforward, but for a variety of logistical reasonsimplementation of it occurred too late <strong>in</strong> the evaluation period to have any potential impact on<strong>crime</strong>.58


6. Changes <strong>in</strong> patterns of burglaryKey to robust evaluation is the notion of effect signatures. This concerns the pattern of resultswhich reflect mechanism – just as signatures bespeak identity – and equally important, whichfail to reflect cherished but erroneous ideas about mechanism. With respect to the currentproject, a number of signatures would be anticipated if reductions <strong>in</strong> <strong>crime</strong> were achieved as aconsequence of Promap- <strong>in</strong>fluenced <strong>in</strong>tervention. For example, reductions <strong>in</strong> <strong>crime</strong> would beexpected to co<strong>in</strong>cide with the tim<strong>in</strong>g and <strong>in</strong>tensity of implementation. However, changes <strong>in</strong>implementation <strong>in</strong>tensity can be measured <strong>in</strong> a number of ways. In a project such as this,where the deployment of police resources varies by time of day as well as day of the year,analyses should consider variation <strong>in</strong> <strong>crime</strong> for different <strong>in</strong>tervals of the day as well as byweek or month of year.With respect to changes <strong>in</strong> patterns of <strong>crime</strong> <strong>in</strong> space, particular a-priori expectations mayalso be expressed. For example, one would expect dist<strong>in</strong>ct changes <strong>in</strong> the spatialconcentration of burglary follow<strong>in</strong>g <strong>in</strong>tervention. In the extreme, if an <strong>in</strong>tervention had theeffect of prevent<strong>in</strong>g all burglaries subject to prediction (those that conform to an identifiedregularity), the spatial distribution of <strong>crime</strong> would appear random follow<strong>in</strong>g <strong>in</strong>tervention. Ofcourse, this scenario is unlikely but dist<strong>in</strong>ct changes <strong>in</strong> the spatial concentration of <strong>crime</strong>should be observed where an <strong>in</strong>tervention has an effect.F<strong>in</strong>ally, <strong>in</strong> addition to expect<strong>in</strong>g changes <strong>in</strong> the temporal and spatial distribution of <strong>crime</strong>,distortions <strong>in</strong> the space-time cluster<strong>in</strong>g of <strong>crime</strong> would be expected. To illustrate, considerthat spatial hotspots of <strong>crime</strong> are def<strong>in</strong>ed by a series of <strong>crime</strong>s that occur dur<strong>in</strong>g some<strong>in</strong>terval. The precise tim<strong>in</strong>g of the events is unimportant, with a spatial hotspot be<strong>in</strong>g def<strong>in</strong>edonly by virtue of a cluster<strong>in</strong>g of events <strong>in</strong> the spatial dimension. An alternative signature is aseries of <strong>crime</strong>s that cluster <strong>in</strong> both space and time; a localised spate. Where police<strong>in</strong>tervention is designed to anticipate such activity, as was the case here, one <strong>in</strong>dication ofsuccess would be a truncation <strong>in</strong> the duration of patterns that might suggest such activity.Consequently, a series of novel analytic techniques were developed to detect signatures ofthe type discussed. However, as is illustrated <strong>in</strong> earlier sections, implementation of the pilotwas <strong>in</strong>sufficient to facilitate an appropriate test of the potential <strong>crime</strong> reductive impact of thepredictive approach. As such, it is suggested that presentation of a sophisticated statisticalanalysis here would be unwise. Instead, <strong>in</strong> the sections that follow, simple analyses arepresented to exam<strong>in</strong>e the changes <strong>in</strong> the patterns of burglary observed before and dur<strong>in</strong>g thepilot project. The reader <strong>in</strong>terested <strong>in</strong> the more detailed analytic approaches used is referredto Appendix 3 for an illustration of the analyses and a more detailed discussion of theirrationale.The basic approach adopted <strong>in</strong> most evaluations is to compare the change <strong>in</strong> the volume of<strong>crime</strong> before and after <strong>in</strong>tervention <strong>in</strong> both an action and comparison area. If a reduction isobserved <strong>in</strong> the action but not comparator, or the reduction <strong>in</strong> the former exceeds that <strong>in</strong> thelatter then a positive <strong>in</strong>ference may be drawn. Figure 6.1 shows the change <strong>in</strong> the volume ofburglary <strong>in</strong> the action area, and a comparison area, Derbyshire ‘C’ Division. The latter wasselected partly because the trends <strong>in</strong> the two areas followed similar patterns prior to<strong>in</strong>tervention but also because discussions with the Command Team suggested that bothDivisions employed similar approaches to <strong>operational</strong> polic<strong>in</strong>g, not least because they werelocated with<strong>in</strong> the same police force, Derbyshire. It is evident from the time-series graph,which shows the patterns for two years prior to the pilot and thereafter, that there was areduction <strong>in</strong> burglary <strong>in</strong> both areas over time. Prior to <strong>in</strong>tervention, which of the two areas hadthe higher volume of burglary each month varied. For this period, the mean monthly count of<strong>crime</strong> was 112 (SD=31.6, N=24) <strong>in</strong> the pilot area, 116 (SD=38.2, N=24) <strong>in</strong> the comparator.59


A simple time-series analysis (see Appendix 3) confirmed that the two areas followed asimilar trend and experienced a similar volume of burglary for the two years before the pilot.At the start of the pilot (August-September) the volume of burglary rose <strong>in</strong> both areas, afterwhich it rema<strong>in</strong>ed somewhat stable <strong>in</strong> the comparison area but fell <strong>in</strong> the pilot area. For themonths of January and February 2006 the volume of burglary <strong>in</strong> the pilot area was the lowestit had been for at least the last five years, be<strong>in</strong>g less than half the volume for the equivalentperiod of time <strong>in</strong> the previous year. 7 For reference, also shown <strong>in</strong> Figure 6.1 are the times atwhich the major implementation outputs of the pilot began.At this po<strong>in</strong>t, it is perhaps useful to provide the reader with a little more <strong>context</strong>ual <strong>in</strong>formationregard<strong>in</strong>g other polic<strong>in</strong>g <strong>in</strong>itiatives implemented <strong>in</strong> ‘A’ Division before or around the time of thepilot. Interviews with the Command Team, LIOs and the analysts for the Division, suggestedthat the only <strong>in</strong>tervention implemented across the Division was the prioritisation of prolific andpriority offenders (PPOs). This began around February 2005 and is ongo<strong>in</strong>g. The aim of the<strong>in</strong>tervention is to target prolific offenders, those who commit the bulk of offences, across theentire BCU with the aim of detect<strong>in</strong>g and consequently reduc<strong>in</strong>g <strong>crime</strong>.Given the focus of this <strong>in</strong>tervention, it is plausible that this could have impacted upon the<strong>in</strong>cidence of burglary before and dur<strong>in</strong>g the pilot period. To see if any changes <strong>in</strong> burglaryoffences observed <strong>in</strong> ‘A’ Division were likely to be attributed to this strategy, the number ofdetections recorded for the seven-month periods before and dur<strong>in</strong>g the pilot were consideredand compared to those <strong>in</strong> ‘C’ Division (which also focused on PPOs). This analysis revealedthat <strong>in</strong> ‘A’ Division the number of detections per 1,000 burglaries <strong>in</strong>creased slightly over time,but less so than it did <strong>in</strong> ‘C’ Division for the same period of time. Moreover, <strong>in</strong> the pilot areathe rate of detections was a little lower for both periods than it was for the same period of timeone year earlier, whereas for the comparison area the reverse was true. This pattern ofresults would suggest that changes <strong>in</strong> the pilot area over time are unlikely to be attributable tothe target<strong>in</strong>g of prolific offenders.Complicated analyses could be conducted to attempt to determ<strong>in</strong>e whether the reduction <strong>in</strong>the <strong>in</strong>cidence of burglary observed was statistically significant. Readers <strong>in</strong>terested <strong>in</strong> whatsuch analyses might show are directed to Appendix 3 of this <strong>report</strong>. However, as alreadydiscussed it is proposed that the <strong>in</strong>terpretation of such analyses would be unclear asimplementation of the pilot on the ground was so limited. Thus, <strong>in</strong> this section a simplemeasure is presented as a guide to the changes observed. The metric computed, an oddsratio, merely contrasts the change <strong>in</strong> the <strong>in</strong>tervention and comparison areas before and after<strong>in</strong>tervention. An odds ratio of one <strong>in</strong>dicates that the changes <strong>in</strong> the two areas werecommensurate, suggest<strong>in</strong>g no change <strong>in</strong> the pilot area. An odds ratio of greater (less) thanone suggests a reduction (<strong>in</strong>crease) <strong>in</strong> the <strong>in</strong>tervention area relative to the change observed<strong>in</strong> the comparison area. The statistical significance of the odds ratio can also be computed(see Lipsey and Wilson, 2001) by estimat<strong>in</strong>g the standard error of the value derived.This technique, which is readily <strong>in</strong>terpretable, has been frequently used <strong>in</strong> researchconcerned with what works <strong>in</strong> reduc<strong>in</strong>g <strong>crime</strong> (for examples, see Welsh and Farr<strong>in</strong>gton, 2006;Gill and Spriggs, 2005), but is not without it critics, particularly for analyses conducted at thesmall area level (for which fluctuations over time may occur even <strong>in</strong> the absence of<strong>in</strong>tervention: Marchant, 2005). However, the problems articulated about this approach arelikely to be less problematic for analyses conducted at the BCU level, for which the variationover time is less of an issue than for smaller areas (see Farr<strong>in</strong>gton and Welsh, 2006). Thus,the approach is used here because it provides a simple assessment of how th<strong>in</strong>gs changed <strong>in</strong>the pilot area relative to the comparator.7 Perhaps ironically, it was at this po<strong>in</strong>t <strong>in</strong> time, dur<strong>in</strong>g which the burglary rate had rema<strong>in</strong>ed stable for the last year,that ‘A’ Division was selected as the pilot location.60


61MonthAug-03Sep-03Oct-03Nov-03Dec-03Jan-04Feb-04Mar-04Apr-04May-04Jun-04Jul-04Aug-04Sep-04Oct-04Nov-04Dec-04Jan-05050Burglary count100150200250Figure 6.1: Time-series graph of the count of burglary before and dur<strong>in</strong>g pilotFeb-05Mar-05Apr-05May-05Jun-05Jul-05Aug-05Sep-05Oct-05Nov-05Dec-05Burglary preventionpack distributionTargeted patrolsControlPilotJan-06Feb-06


Two approaches were used to compute the standard errors (s<strong>in</strong>ce these are critical <strong>in</strong> determ<strong>in</strong><strong>in</strong>g thesignificance of the effect-size derived), one used by Farr<strong>in</strong>gton and colleagues (see Welsh andFarr<strong>in</strong>gton, 2006), the other by Gill and Spriggs (2005), 8 Both approaches converged on similarestimates and hence only the former are <strong>report</strong>ed here.To calculate the odds ratios (OR), the count of <strong>crime</strong> for the same period of time before and dur<strong>in</strong>g thepilot were contrasted. 9 The standard errors were computed <strong>in</strong> the usual way (see Lipsey and Wilson,2001) as well as us<strong>in</strong>g monthly variation as suggested by Gill and Spriggs (2005). Table 6.1 showsthe count of burglary for the periods before and dur<strong>in</strong>g the pilot phase along with the OR, andassociated confidence <strong>in</strong>tervals and z-score. The confidence <strong>in</strong>tervals shown, calculated us<strong>in</strong>g thetraditional approach <strong>in</strong>dicates the upper and lower estimates of the odds ratios. These suggest thatthe true odds ratio lies somewhere between 0.99 and 1.34. The z-score provides an <strong>in</strong>dication of thelikely statistical significance of the OR. For a two-tailed test, the z-score is required to exceed 1.96.On the basis of these results, the analysis would suggest that the reduction <strong>in</strong> burglary observed <strong>in</strong> ‘A’Division exceeded that <strong>in</strong> the comparison area, but that the trend was marg<strong>in</strong>ally non-significant.Table 6.1: Change <strong>in</strong> the volume of burglary and odds-ratio statisticsBefore After GrosschangeOddsratioConfidence<strong>in</strong>tervalz-scorePilot 663 554 109 1.15 0.99-1.34 1.80Comparisonarea684 659 25Given the duration of the pilot and the implementation issues experienced the only surpris<strong>in</strong>g featureof this result is that it came so close to statistical reliability. The above analysis considers only generalchanges <strong>in</strong> burglary over time and thus <strong>in</strong> the next section changes <strong>in</strong> the time of day when burglariesoccurred will be exam<strong>in</strong>ed.Change <strong>in</strong> the time of day burglaries were committedAs noted <strong>in</strong> the implementation section of the ma<strong>in</strong> <strong>report</strong>, there was a consensus of op<strong>in</strong>ion that thepredictive maps were more frequently used dur<strong>in</strong>g the even<strong>in</strong>gs, when reactive polic<strong>in</strong>g demands onpatroll<strong>in</strong>g officer time were typically less acute. Thus, one expectation would be that if the predictivemaps were used more frequently for resource allocation dur<strong>in</strong>g the even<strong>in</strong>gs, there should beobserved a greater reduction <strong>in</strong> the number of burglaries that occurred dur<strong>in</strong>g this time of day follow<strong>in</strong>gthe <strong>in</strong>ception of the pilot.To explore this, rather than analys<strong>in</strong>g changes <strong>in</strong> the rate of burglary for each hour of the day, theapproach adopted <strong>in</strong> an earlier section of the <strong>report</strong> was used. That is, the shift dur<strong>in</strong>g which everyburglary occurred was identified (by comput<strong>in</strong>g the mid-po<strong>in</strong>t of the earliest and latest times the eventcould have occurred) and the monthly patterns summarised. Only burglaries for which the w<strong>in</strong>dow of<strong>report</strong><strong>in</strong>g was less than eight hours were <strong>in</strong>cluded <strong>in</strong> the analysis. Consequently, there was someattrition <strong>in</strong> the volume of data analysed (50% of events occurred with<strong>in</strong> an <strong>in</strong>terval of eight hours). Afurther analysis (not shown), conducted us<strong>in</strong>g a w<strong>in</strong>dow of fifteen hours to <strong>in</strong>crease the sample size(64% of events occurred with<strong>in</strong> a fifteen-hour <strong>report</strong><strong>in</strong>g w<strong>in</strong>dow), revealed the same pattern of results.Figure 6.2 shows the change over time <strong>in</strong> the proportion of all burglaries committed with<strong>in</strong> ‘A’ Divisionthat occurred dur<strong>in</strong>g the even<strong>in</strong>g shift, before and after the start of the pilot. A trend l<strong>in</strong>e is <strong>in</strong>cluded toillustrate the pattern prior to the start of the scheme. The figure illustrates that there was some8 Gill and Spriggs (2005) use a slightly different approach to calculate the standard by consider<strong>in</strong>g the monthly fluctuation <strong>in</strong> thevolume of <strong>crime</strong> to reduce a problem known as over-dispersion.9 The pilot started <strong>in</strong> the middle of August but <strong>in</strong> the analyses that follow, for simplicity 1 August is taken as the start date. Theeffect of so do<strong>in</strong>g is to make the analyses more conservative.62


variation <strong>in</strong> the proportion of burglaries that were committed dur<strong>in</strong>g the even<strong>in</strong>g (mean = 0.20,SD=0.07, N=52) before the start of the pilot, and that over time the overall trend was ever so slightlyupwards. Follow<strong>in</strong>g the start of the pilot, and particularly from September onwards, the proportion ofburglaries committed dur<strong>in</strong>g the even<strong>in</strong>g dropped (mean = .11, SD=0.04, N=7); the monthly variationobserved also decreased. Thus, it would appear that follow<strong>in</strong>g the start of the pilot the proportion ofburglaries committed dur<strong>in</strong>g the even<strong>in</strong>g decreased.Figure 6.2: Changes <strong>in</strong> the proportion of burglaries committed dur<strong>in</strong>g the even<strong>in</strong>g over time (forevents for which the <strong>in</strong>terval between the earliest and latest <strong>report</strong><strong>in</strong>g times was less than 8 hours)0.400.35BeforeDur<strong>in</strong>gL<strong>in</strong>ear (Before)Proportion of all burglaries0.300.250.200.150.100.050.00MonthApr-03Dec-02Aug-02Apr-02Dec-01Aug-01Apr-01Dec-05Aug-05Apr-05Dec-04Aug-04Apr-04Dec-03Aug-03Further analyses explored the change <strong>in</strong> the patterns for the other two shifts. Naturally, changeswould be expected <strong>in</strong> at least one of these as the unit of analysis was a proportional measure.Figures 6.3 and 6.4 show the changes observed dur<strong>in</strong>g the morn<strong>in</strong>g and daytime, respectively. Therewas little change <strong>in</strong> the mean proportion of events committed dur<strong>in</strong>g the morn<strong>in</strong>g before (Mean=0.39,SD=0.09, N=52) and dur<strong>in</strong>g the pilot phase (Mean=0.36, SD=0.09, N=7).63


Figure 6.3: Changes <strong>in</strong> the proportion of burglaries committed dur<strong>in</strong>g the morn<strong>in</strong>g over time(for events for which the <strong>in</strong>terval between the earliest and latest <strong>report</strong><strong>in</strong>g times was less than 8 hours)0.700.60Proportion of all burglaries0.500.400.300.200.10BeforeDur<strong>in</strong>gL<strong>in</strong>ear (Before)0.00MonthDec-05Aug-05Apr-05Apr-03Dec-02Aug-02Apr-02Dec-01Aug-01Apr-01Dec-04Aug-04Apr-04Dec-03Aug-03Dur<strong>in</strong>g the daytime, more events were committed dur<strong>in</strong>g the pilot phase (Mean=0.53, SD=0.09, N=52)than before (Mean=0.40, SD=0.10, N=7), although (and unlike the trend observed for eventscommitted dur<strong>in</strong>g the even<strong>in</strong>g) the pattern observed dur<strong>in</strong>g the pilot phase was not completely unlikethat observed <strong>in</strong> the recent past.64


Figure 6.4: Changes <strong>in</strong> the proportion of burglaries committed dur<strong>in</strong>g the daytime over time (forevents for which the <strong>in</strong>terval between the earliest and latest <strong>report</strong><strong>in</strong>g times was less than 8 hours)0.700.60Proportion of all burglaries0.500.400.300.200.10BeforeDur<strong>in</strong>gL<strong>in</strong>ear (Before)0.00MonthDec-05Aug-05Apr-05Apr-03Dec-02Aug-02Apr-02Dec-01Aug-01Apr-01Dec-04Aug-04Apr-04Dec-03Aug-03Consider<strong>in</strong>g the changes <strong>in</strong> the comparison area, as shown <strong>in</strong> Figure 6.5 there was also observed areduction <strong>in</strong> the proportion of burglaries committed dur<strong>in</strong>g the even<strong>in</strong>g, although the change over timewas not as dist<strong>in</strong>ct (means = 0.24 and 0.17, SDs = 0.11 and 0.05, N=52 and 7, respectively) as for thepilot area and <strong>in</strong> the comparison area the trend was more similar to the historic trend, particularly ifone takes account of the outly<strong>in</strong>g observation <strong>in</strong> July.As a further analysis, and to take account of seasonality, the proportion of burglaries committed dur<strong>in</strong>gthe even<strong>in</strong>g for the pilot <strong>in</strong>terval (August 2004 to February 2005) and for the same period for the yearbefore (August 2003 to February 2004) were compared for both pilot and comparison areas. For thepilot area the proportion was lower dur<strong>in</strong>g implementation (mean=0.11, SD=0.04, N=7) than for thesame period the year before (mean=0.17, SD=0.07, N=7), a difference which achieved statisticalsignificance (z=2.03, p


Figure 6.5: Changes <strong>in</strong> the proportion of burglaries committed dur<strong>in</strong>g the even<strong>in</strong>g over time (forevents for which the <strong>in</strong>terval between the earliest and latest <strong>report</strong><strong>in</strong>g times was less than 8 hours)0.600.50BeforeDur<strong>in</strong>gL<strong>in</strong>ear (Before)Proportion of all burglaries0.400.300.200.100.00MonthApr-03Dec-02Aug-02Apr-02Dec-01Aug-01Apr-01Dec-05Aug-05Apr-05Dec-04Aug-04Apr-04Dec-03Aug-03The above results, which show a selective pattern, are certa<strong>in</strong>ly <strong>in</strong> l<strong>in</strong>e with what would be expected ifthe system had been used most frequently dur<strong>in</strong>g the even<strong>in</strong>g and was helpful <strong>in</strong> reduc<strong>in</strong>g burglary.However, to provide a more conclusive result, data for a longer period of time dur<strong>in</strong>g whichimplementation occurred would be required to demonstrate cont<strong>in</strong>uation of the observed trend. Inparticular, this would further help to rule out any seasonal effect. Thus, it is suggested that the resultshown is entic<strong>in</strong>g but <strong>in</strong>conclusive.As discussed at the start of this section, detailed analyses were conducted to explore changes overtime <strong>in</strong> the spatial and spatio-temporal distribution of burglary. For reasons already discussed, theseanalyses are presented <strong>in</strong> Appendix 3.66


7. ConclusionsIn this section, the ma<strong>in</strong> f<strong>in</strong>d<strong>in</strong>gs of the research will be discussed and recommendations <strong>in</strong>spired bythem presented. The central aims of the current project were as follows:• to determ<strong>in</strong>e whether patterns of burglary are communicable across a range of areas;• to test the accuracy of a predictive <strong>mapp<strong>in</strong>g</strong> system across the same areas and compare itwith contend<strong>in</strong>g alternatives;• to tailor the system for use <strong>in</strong> an <strong>operational</strong> <strong>context</strong>;• to see if the system could be used <strong>operational</strong>ly and how it was received by those who mightuse it; and• to test the efficacy of the system dur<strong>in</strong>g a field trial <strong>in</strong> one police BCU.The first four aims were achieved. The results demonstrated that across all areas the risk of burglarywas communicable. Follow<strong>in</strong>g a burglary at one home the risk to those nearby was elevated for aperiod of time afterwards. This pattern conformed to a pattern of spatial and temporal decay. Thosenearest were at the greatest risk, and the change <strong>in</strong> risk decreased as time elapsed. Further researchdemonstrated that when events occurred close <strong>in</strong> space and time they tended to do so at a similartime of day. For repeat victimisation proper, this consistency also emerged around five to six weekslater, a f<strong>in</strong>d<strong>in</strong>g compatible with explanations of the tim<strong>in</strong>g <strong>in</strong> the elevation <strong>in</strong> risk often observed for thetime course of repeat victimisation more generally (i.e. offenders revisit<strong>in</strong>g homes to steal replacedgoods). Exploratory analyses described later <strong>in</strong> the <strong>report</strong> considered the length of space-timeclusters of <strong>crime</strong> for one area. This approach will be developed <strong>in</strong> ongo<strong>in</strong>g research underway by theauthors.Recommendation 1 Given the evident ubiquity of the space-time cluster<strong>in</strong>g of burglary across theareas studied, it would be wise for some of the analyses discussed <strong>in</strong> the <strong>report</strong> to be conducted bypolice analysts to provide a better understand<strong>in</strong>g of <strong>crime</strong> <strong>in</strong> their area. Whilst simple analyticsoftware is currently unavailable, an application that performs the same k<strong>in</strong>ds of analyses describedhere is currently be<strong>in</strong>g developed as part of a National Institute for Justice-funded project (Ratcliffe,2006). This will be released as freeware <strong>in</strong> 2007 and will be compatible with a variety of off-the-shelfsoftware tools.Recommendation 2 Where it is found that <strong>crime</strong> (burglary and other types) clusters <strong>in</strong> space and timeacutely, strategies aimed at the prevention of further <strong>crime</strong>s <strong>in</strong> a local spate could be developed toprevent or detect <strong>crime</strong>s. As a short-term strategy, this could be partially achieved (for example) us<strong>in</strong>ga GIS and the prioritisation of police resources by police analysts to homes nearby, and similar tothose recently burgled. A number of police forces, <strong>in</strong>clud<strong>in</strong>g Cleveland, Dorset and the Police Servicefor Northern Ireland have developed such strategies. Relative to Promap, this will be a sub-optimalapproach but may be a useful first step.As for the accuracy of Promap, this method was shown to be superior to those extant, even when thelatter were optimised. In addition to produc<strong>in</strong>g maps that more accurately predicted where futureburglaries occurred, the maps identified more coalescent areas for targeted patroll<strong>in</strong>g. Furtherdevelopment of the system <strong>in</strong>volved the <strong>in</strong>clusion of an opportunity surface that was used to weightthe predictions made. This enhanced the accuracy of the system still further. Prior to implementation,a f<strong>in</strong>al feature of the <strong>mapp<strong>in</strong>g</strong> system developed was the facility to produce predictions on a shift-byshiftbasis, which understandably appealed to those who used the system.Despite <strong>in</strong>itial scepticism by some officers, by the end of the pilot the system was well received andgenerally perceived as a useful tool for targeted <strong>crime</strong> reduction. As testament to this, a number ofofficers asked if the technique could be applied to other types of <strong>crime</strong> such as theft from a motorvehicle. Recent work by the authors suggests this to be the case (Johnson et al., 2006), and furtherprojected work will seek to develop this use. An additional feature of the future system, welcomed bythose <strong>in</strong>terviewed as part of the project, would be the facility to anticipate changes <strong>in</strong> which <strong>crime</strong> typeshould be prioritised for reduction over the next few days or weeks.67


With respect to implementation realised dur<strong>in</strong>g the pilot, despite widespread belief <strong>in</strong> the usefulness ofthe system, a number of factors limited the extent to which <strong>operational</strong> tactics were deployed <strong>in</strong>response to the predictions generated. These have been described <strong>in</strong> the body of the <strong>report</strong>. Theanalyses of the potential impact on burglary, many of which were novel, were carried out and are<strong>report</strong>ed <strong>in</strong> fulfilment of contract rather than <strong>in</strong> expectation of success given tardy implementation. Itwas not realistic to anticipate <strong>crime</strong> reductions dur<strong>in</strong>g the currency of the project as delayed, and theencourag<strong>in</strong>g trends at its end must be considered as an unexpected bonus. Had they not emerged,the writers would have been no less excited and energised by the potential of prospective <strong>mapp<strong>in</strong>g</strong> for<strong>crime</strong> reduction. The reasons for that excitement will be elaborated below.Recommendation 3 Analytic methods used to identify mechanisms of change <strong>in</strong> the evaluation of<strong>crime</strong> reduction <strong>in</strong>terventions are often limited. The techniques described <strong>in</strong> Appendix 3 of this <strong>report</strong>illustrate a number of ways <strong>in</strong> which particular ‘signatures’ that might bespeak mechanism for<strong>in</strong>terventions aimed at dispers<strong>in</strong>g hotspots may be sought. It is recommended that such approachesare used more widely to evaluate <strong>in</strong>tervention.The Promap system trialled <strong>in</strong> Derby allows the prediction of burglary events far better than previous<strong>mapp<strong>in</strong>g</strong> systems. Predictability of <strong>crime</strong> location is a major aid to its prevention, by disruption anddetection. St<strong>in</strong>g operations are uniquely effective because the time and location of <strong>crime</strong> is known.<strong>Prospective</strong> <strong>mapp<strong>in</strong>g</strong> <strong>in</strong> the shape of Promap takes us much closer to achiev<strong>in</strong>g predictability. Thequantum leap <strong>in</strong> performance it achieves over previous systems comes by the <strong>in</strong>corporation of thetime dimension. The soccer cliché is that a striker has to be <strong>in</strong> the right place at the right time to scorea goal. The former striker, Gary L<strong>in</strong>eker, makes the po<strong>in</strong>t that this is mean<strong>in</strong>gless <strong>in</strong> that if a player is<strong>in</strong> the right place at the wrong time, that makes it the wrong place. If the player is <strong>in</strong> the wrong place atthe right time, that makes it the wrong time! Only by th<strong>in</strong>k<strong>in</strong>g about time and place together astime=place does the cliché make sense (however banal). Similarly, a police officer must be <strong>in</strong> the righttime-place to disrupt or detect <strong>crime</strong>. Historically, and with a few recent exceptions, <strong>crime</strong> <strong>mapp<strong>in</strong>g</strong> forthe police service has neglected the time dimension. The Derby trial of Promap highlighted how‘slippery’ and shift-specific hotspots are, overla<strong>in</strong> on a degree of location stability. Perhaps it is themismatch between a conventional map show<strong>in</strong>g a nightclub to be a hotspot with its quietness everyMonday morn<strong>in</strong>g as experienced by a patroll<strong>in</strong>g officer which leads to a schizoid view of the relevanceof <strong>mapp<strong>in</strong>g</strong> for <strong>operational</strong> polic<strong>in</strong>g. Promap, by the centrality of time <strong>in</strong> its construction, negates thatproblem.Some technologies are recognisable as hav<strong>in</strong>g massive potential future applicability while early <strong>in</strong>development. (What use is a new born baby)? Nanotechnology is one obvious current example. Stemcell use for organ repair is another. Whilst on a different scale, the writers believe Promap is anotherexample. However, there must be a development process which does not seek dramatic early <strong>crime</strong>reductions (although some should occur) and be addressed to resolv<strong>in</strong>g two issues, set out <strong>in</strong> thefollow<strong>in</strong>g paragraphs. Should effort be given to resolv<strong>in</strong>g them? The writers’ emphatic view is that theyshould. The game is very much worth the candle.The first problem stand<strong>in</strong>g between Promap and rout<strong>in</strong>e use is that the police have to attend <strong>in</strong>cidentsof <strong>crime</strong> and disorder generally, while Promap as yet covers a limited number of <strong>crime</strong> types.Development must extend to all categories of <strong>crime</strong> and disorder. The relevant science completed, therelative importance of different events <strong>in</strong> driv<strong>in</strong>g patroll<strong>in</strong>g patterns must be <strong>in</strong>corporated <strong>in</strong> thePromap algorithm. This is a matter of polic<strong>in</strong>g policy. Unpublished work from the Department ofOperational Science at Lancaster University <strong>in</strong> the late 1970s demonstrated that such policy choicesmust be tested and that police preferences changed accord<strong>in</strong>g to the mix of offences detected. Apartfrom this immediate complication, police preferences may change from time to time with chang<strong>in</strong>gpriorities. There must, <strong>in</strong> short, be some weight<strong>in</strong>g to direct a patrol to a location which will host threeassaults and two thefts rather than a location which will host three thefts and two assaults.The second problem to be resolved before Promap can realise its potential would rema<strong>in</strong> even afterthe first is resolved. Promap output must be delivered <strong>in</strong> real time to police officers <strong>in</strong> the form ofpresumptive patroll<strong>in</strong>g patterns. This is not difficult even with current technology but comes at a cost.The most prom<strong>in</strong>ent obstacle is bedd<strong>in</strong>g Promap <strong>in</strong>to polic<strong>in</strong>g craft. Officers must always be able tooverride a presumptive patroll<strong>in</strong>g pattern on the basis of personal knowledge, but must come to trustthat the presumptive pattern of patrol is soundly based.68


Recommendation 4 Further development of Promap or a variant should, <strong>in</strong> the authors view, be apriority. The research presented here demonstrates the superiority of the approach over exist<strong>in</strong>gcontenders and shows that it is welcomed by the police. To achieve what is clearly possible willrequire further development of the system and a series of field trials across a range of different<strong>context</strong>s.Recommendation 5 The utility of the approach should be explored for a range of <strong>crime</strong> types.Recommendation 6 It would be useful to dist<strong>in</strong>guish between areas for which risks are <strong>in</strong>creas<strong>in</strong>gand those for which they are stable or decl<strong>in</strong><strong>in</strong>g. Operational tactics would vary for these two types ofarea.If the writers might be allowed to end on a flight of fancy, they envisage a situation <strong>in</strong> perhaps fifteenyears when predictive <strong>mapp<strong>in</strong>g</strong> is available for all <strong>crime</strong> types, real time <strong>in</strong>formation on risk is availableto police patrols, where the seriousness of different <strong>crime</strong> types is weighted automatically so that anoptimal patroll<strong>in</strong>g pattern is provided to each police vehicle to maximise the total seriousness of <strong>crime</strong>sto be preventively patrolled. Used <strong>in</strong> concert with Lab-on-a-chip forensic test<strong>in</strong>g, where DNA and othertests would be possible <strong>in</strong> police vehicles, would facilitate swift forensic identification of perpetrators of<strong>crime</strong>s not prevented, and patroll<strong>in</strong>g <strong>in</strong>formed by Promap would mean faster response times to arrivebefore <strong>crime</strong> scenes are compromised for forensic purposes. In parallel with optimised patroll<strong>in</strong>g,Promap would deliver <strong>in</strong>formation about longer-term patterns and stabilities <strong>in</strong> <strong>crime</strong> and disorder toCrime and Disorder Reduction Partnerships, enabl<strong>in</strong>g them to put <strong>in</strong> place design and ma<strong>in</strong>tenancechanges. Noth<strong>in</strong>g <strong>in</strong> such a future is unfeasible even with today’s technology. It does, however requirean effort of imag<strong>in</strong>ation to discern the centrality of prospective <strong>mapp<strong>in</strong>g</strong> to such a future.The authors’ nightmare scenario is that Promap suffers death by a thousand trials. When assaultive<strong>crime</strong> is shown to be Promap predictable, m<strong>in</strong>or changes <strong>in</strong> such <strong>crime</strong> will likely be achieved.However, s<strong>in</strong>ce the police have to put Promap for assault alongside non-Promap-based decisionmak<strong>in</strong>g for other <strong>crime</strong> types, they will have to decide at any moment whether they are <strong>in</strong> Promap ornon-Promap mode. Only when Promap is the default basis for rout<strong>in</strong>e polic<strong>in</strong>g will its benefits becomevisible. This is a brazen plea that any further fund<strong>in</strong>g of Promap focuses on the eventual realisation ofan <strong>in</strong>tegrated system, rather than short-term and <strong>crime</strong>-specific <strong>operational</strong> trials.69


ReferencesAggresti, A. (1996) An Introduction to Categorical Data Analysis. New York: Wiley.Allison, D.B. and Gorman, B.S. (1993) ‘Calculat<strong>in</strong>g Effect Sizes For Meta-Analysis: The Case of TheS<strong>in</strong>gle Case’. Behaviour Research and Therapy, 31(6), 621-631.Anderson, D., Chenery, S. and Pease, K. (1995) ‘Bit<strong>in</strong>g Back: Tackl<strong>in</strong>g Repeat Burglary and CarCrime’. Crime Detection and Prevention Series, Paper No. 58. London: Home Office PoliceDepartment.Ashton, J., Senioe, B., Broen, I. and Pease, K. (1998) ‘Repeat Victimisation: Offender Accounts’International Journal of Risk, Security and Crime Prevention, (3), 269-280Bailey, T. C. and Gatrell, A. C. (1995) Interactive Spatial Data Analysis, Harlow: Longman.Beavon, D. and Brant<strong>in</strong>gham, P. (1994) ’The Influence of Street Networks on the Pattern<strong>in</strong>g ofProperty Offences’. In Crime Prevention Studies, Vol. 2, R. Clarke (ed.), Monsey, N.Y.: Crim<strong>in</strong>alJustice Press.Besag, J. and Diggle, P.J. (1977) ‘Simple Monte Carlo Tests for Spatial Pattern’. Applied Statistics,(26), 327-333.Blake, L. and Coupe, R. (2001) ‘The impact of s<strong>in</strong>gle and two-officer patrols on catch<strong>in</strong>g burglars <strong>in</strong>the act’. British Journal of Crim<strong>in</strong>ology 41(2), 381-396.Bowers, K.J., Johnson, S.D. and Pease, K. (2004) ‘<strong>Prospective</strong> Hot-Spott<strong>in</strong>g: The Future of CrimeMapp<strong>in</strong>g?’ British Journal of Crim<strong>in</strong>ology, 44, 641-658.Bowers, K., Johnson, S. and Hirshfield, A. (2004) ‘Clos<strong>in</strong>g off Opportunities for Crime: AnEvaluation of Alley-Gat<strong>in</strong>g’. European Journal on Crim<strong>in</strong>al Policy and Research, 10,(4),283-308.Bowers, K.J., and Johnson, S.D. (2005a) ‘A Test of the Boost explanation of Near Repeats’.Western Crim<strong>in</strong>ology Review, 5(3),12-24.Bowers, K.J., and Johnson, S.D. (2005b) ‘Domestic burglary repeats and space-time clusters: thedimensions of risk’. European Journal of Crim<strong>in</strong>ology, 2(1), 67-92.Burrows, J. and Heal, K. (1980) ‘Police Car Security Campaign’ <strong>in</strong> Design<strong>in</strong>g Out Crime, Clarke,R.V.G. and Mayhew, P. (eds.). London: HMSO.Cha<strong>in</strong>ey, S. and Ratcliffe, J.H. (2005) GIS and Crime Mapp<strong>in</strong>g, Federation Press: Sydney.Clarke, R.V. (2002) ‘Burglary of Retail Establishments’. Problem-Oriented Guides for Police SeriesNo. 15.Wash<strong>in</strong>gton: U.S. Department of Justice.Clarke, R.V. (1997). Situational Crime Prevention: Successful Case Studies, 2nd edition. Guiderland,NY: Harrow and Heston.Clarke, R.V.G. and Eck, J. (2003) Become a Problem-Solv<strong>in</strong>g Crime Analyst. Jill Dando Institute ofCrime Science: London.Dixon, N.R.F. (1976) On the Psychology of Military Incompetence. London: Jonathan Cape.Eck, J. and Weisburd, D. (1995) Crime and Place. Monsey NY: Crim<strong>in</strong>al Justice Press.Ekblom, P. (2002). ‘Future Imperfect: Prepar<strong>in</strong>g for the Crimes to Come’. Crim<strong>in</strong>al Justice Matters, 46,38-40.70


Ericsson, U. (1995) Straight from the Horse’s Mouth. Forensic Update, 43, 23-25.Everson, S. and Pease, K. (2001) ‘Crime Aga<strong>in</strong>st the Same Person and Place: Detection,Opportunity and Offender Target<strong>in</strong>g’. In Crime Prevention Studies Volume 12: Repeat Victimisation,G. Farrell and K. Pease (Eds.) New York: Crim<strong>in</strong>al Justice Press.Everson, S. (2003) ‘Repeat Victimisation and Prolific Offend<strong>in</strong>g: Chance or Choice?’ InternationalJournal of Police Science & Management, 5(3),180-194.Farrell, G. (2005) ‘Progress and Prospects <strong>in</strong> the Prevention of Repeat Victimization’. In theHandbook of Crime Prevention and Community Safety, N. Tilley (Ed.). Cullompton: Willan.Farrell, G. and Pease, K. (1994) ‘Crime Seasonality: Domestic Disputes and Residential Burglary <strong>in</strong>Merseyside 1988-90’. British Journal of Crim<strong>in</strong>ology 34, 487-497.Farrell, G., Phillips, C and Pease. K. (1995) ’Like Tak<strong>in</strong>g Candy: Why does repeat victimizationoccur?’ British Journal of Crim<strong>in</strong>ology, 35, 3, 384-399.Farrell, G., Chenery, S. and Pease, K. (1998) Consolidat<strong>in</strong>g Police Crackdowns: F<strong>in</strong>d<strong>in</strong>gs from anAnti-Burglary Project. Police Research Series Paper 113. London: Home Office.Farr<strong>in</strong>gton, D.F, and Welsh, B.C. (2006) ‘How Important is “Regression To The Mean” <strong>in</strong> Area-BasedCrime Prevention Research’. Crime Prevention and Community Safety, 8, 50-60.Forrester, D., Frenz, S, O’Connell, M. and Pease, K. (1990) The Kirkhold Burglary PreventionProject: Phase II. Crime Prevention Unit, Paper 23. London: Home Office.Forrester, D., Chatterton, M., and Pease, K. (1988) The Kirkholt Burglary Prevention Project,Rochdale. Crime Prevention Unit Paper 13. London: Home Office.Gill, M. and Spriggs, A. (2005) Assess<strong>in</strong>g the impact of CCTV. Home Office Research Study No.292. London: Home Office.Gill, P. and Mathews, R. (1994) ’Robbers on robbery: offenders perspectives’. In Crime at Work, M.Gill (Ed.). Leicester: Perpetuity Press.Gill, M, Rose, A. and Coll<strong>in</strong>s, K. (2005) A good practice guide for the implementation of redeployableCCTV. Home Office Onl<strong>in</strong>e Report No.16. London: Home Office.Johnson, S.D., and Bowers, K.J. (2003) ‘Opportunity is <strong>in</strong> the eye of the beholder: The role ofpublicity <strong>in</strong> <strong>crime</strong> prevention’. Crim<strong>in</strong>ology and Public Policy,2(3), 201-228.Johnson, S.D., Bowers, K., and Hirschfield, A. (1997) ‘New Insights <strong>in</strong>to the Spatial and TemporalDistribution of Repeat Victimisation’. The British Journal of Crim<strong>in</strong>ology, 37(2), 224-244.Johnson, S.D., Bernasco, W., Bowers, K.J., Elffers, H., Ratcliffe, J., Rengert, G. and Townsley,M.T. (2006) Space Time Patterns of Risk: A Cross National Assessment of Residential BurglaryVictimization. Submitted.Johnson, S.D. and Bowers, K.J. (2004) The burglary as clue to the future: the beg<strong>in</strong>n<strong>in</strong>gs ofprospective hot-spott<strong>in</strong>g. European Journal of Crim<strong>in</strong>ology, 1(2), 237-255.Johnson, S.D. and Bowers, K.J. (2004) ‘The stability of space-time clusters of burglary’. The BritishJournal of Crim<strong>in</strong>ology, 44(1), 55-65.Johnson, S.D., Bowers, K. and Pease, K. (2005) ‘Predict<strong>in</strong>g the Future or Summaris<strong>in</strong>g the Past?’Crime Mapp<strong>in</strong>g as Anticipation. In Crime Science: New Approaches to Prevent<strong>in</strong>g and Detect<strong>in</strong>gCrime, M. Smith and N. Tilley (Eds.) 145-163.71


Johnson, S.D., Summers, L., and Pease, K. (2006) Vehicle Crime: Communicat<strong>in</strong>g Patterns of Risk<strong>in</strong> Space and Time. Report to the Home Office.Knox, G. (1964). ‘Epidemiology of Childhood Leukaemia <strong>in</strong> Northumberland and Durham’. BritishJournal of Preventative and Social Medic<strong>in</strong>e, 18, p17-24.Lamm Weisel, D. (2002) ‘Burglary of S<strong>in</strong>gle-Family Houses’. Problem-Oriented Guides for PoliceSeries, No.18. Wash<strong>in</strong>gton: U.S. Department of Justice.Laycock, G. and Tilley, N. (1995) Polic<strong>in</strong>g and Neighborhood Watch: Strategic Issues. CrimeDetection and Prevention Series, No. 60. London: Home Office.Laycock, G. (1985) Property Mark<strong>in</strong>g: a deterrent to domestic burglary? Crime Prevention Unit, PaperNo. 3. London: Home Office.Lipsey, M.W. and Wilson, D.B. (2001) Practical Meta-Analysis. Thousand Oaks, CA: Sage.Lister, S., Wall, D. and Bryan,J. (2004) Evaluation of the Leeds Distraction Burglary Initiative. HomeOffice Onl<strong>in</strong>e Report No. 44. London: Home Office.Marchant, P. (2005) ‘What Works? A Critical Note on the Evaluation of Crime Reduction Initiatives’.Crime Prevention and Community Safety: An International Journal, 7(2), 7-14.McLaughl<strong>in</strong>, L.M., Johnson, S.D., Bowers, K.J., Birks, D.J. and Pease, K. (2007) ‘PolicePerceptions of the Long and Short Term Spatial Distribution of Residential Burglary’. The InternationalJournal of Police Science and Management, <strong>in</strong> press.Nelson, D., Coll<strong>in</strong>s, L. and Gant, F. (2002) The stolen property market <strong>in</strong> the Australian CapitalTerritory. Canberra: Australian Institute of Crim<strong>in</strong>ology.North, B.V., Curtis, D. and Sham, P.C. (2002) ‘A note on the Calculation of Empirical P Values fromMonte Carlo Procedures’. American Journal of Human Genetics, 71/2, 439-441.Openshaw, S. (Ed) (1995) Census Users’ Handbook. Cambridge: GeoInformation International.Pease, K. (1998) Repeat Victimisation: Tak<strong>in</strong>g Stock. Prevent<strong>in</strong>g and Detect<strong>in</strong>g Crime, Paper 98.London: Home Office.Polvi, N., Looman, T., Humphries, C. and Pease, K. (1991) ‘The Time Course of Repeat BurglaryVictimisation’, British Journal of Crim<strong>in</strong>ology, 31(4), 411-14Ratcliffe, J. H. (2002) ‘Aoristic signatures and the temporal analysis of high volume <strong>crime</strong> patterns’.Journal of Quantitative Crim<strong>in</strong>ology, 18 (1): 23-43.Ratcliffe, J. H. (2005) ‘Detect<strong>in</strong>g spatial movement of <strong>in</strong>tra-region <strong>crime</strong> patterns over time, Journal ofQuantitative Crim<strong>in</strong>ology’. 21(1): 103-123.Ratcliffe, J.H. (2006) Detect<strong>in</strong>g the near repeat phenomenon <strong>in</strong> local and regional <strong>crime</strong> data. NIJgrant.Rengert, G. and Wasilchick, J. (2000) Suburban Burglary: A Tale of Two Suburbs. Spr<strong>in</strong>gfield, IL:Charles Thomas.Riley, D. (1980) ‘An Evaluation of a Campaign to Reduce Vandalism’. In Design<strong>in</strong>g Out Crime, Clarke,R.V. & Mayhew, P. (eds.). London: HMSO.Shadish, W.R., Cook, T.D., and Campbell, D.T. (2002) Experimental and Quasi-Experimental Designs for Generalized Causal Inference. Boston: Houghton Miffl<strong>in</strong> Company.72


Simpson, E.H. (1959) ‘The Interpretation of Interaction <strong>in</strong> Cont<strong>in</strong>gency Tables’. Journal of the RoyalStatistical Society, Series B, 13, 238-241.Smith, M.J., Clarke, R.V., and Pease, K. (2002) ‘Anticipatory Benefit <strong>in</strong> Crime Prevention’. InAnalysis for Crime Prevention: Crime Prevention Studies 13, Tilley, N. (ed.) Crim<strong>in</strong>al Justice Press.Spelman, W. (1994) Crime Incapacitation. New York: Plenum.Stockdale, J. E. and Gresham, P.J. (1995) Combat<strong>in</strong>g Burglary: An Evaluation of Three Strategies.Crime Detection & Prevention Series, Paer 59. London: Home Office.Sunder, N. and Birks, D.J. (2004) ‘Measur<strong>in</strong>g Incidence, Prevalence and Concentration: Implicationsfor Polic<strong>in</strong>g’. Crime Prevention and Community Safety: An International Journal, <strong>in</strong> press.Sutton, M. (1998) Handl<strong>in</strong>g stolen goods and theft: a market reduction approach. Home OfficeResearch Study, No. 178. London: Home Office.Tilley, N. (1993) ‘After Kirkholt – Theory, Method and Results of Replication Evaluations’. PoliceResearch Group Crime Prevention Unit series Paper 47. London: Home Office.Tilley, N. and Hopk<strong>in</strong>s, M. (1998) Bus<strong>in</strong>ess as Usual: An Evaluation of the Small Bus<strong>in</strong>ess and CrimeInitiative. Police Research Series, Paper No. 95. London: Home Office Police Department.Tilley, N and Webb, J. (1994) Burglary Reduction: F<strong>in</strong>d<strong>in</strong>gs from Safer Cities Schemes. CrimePrevention Unit Series, Paper No. 51. London: Home Office Police Department.Townsley, M. Homel, R. and Chasel<strong>in</strong>g, J. (2003) ‘Infectious Burglaries: A Test of the Near RepeatHypothesis’. British Journal of Crim<strong>in</strong>ology, 43, 615-633Tseloni, A. and Pease, K. (2004) Population Inequality: The Case of Repeat Victimisation. Insubmission.Wagner, A. (1997) ‘A Study of Traffic Pattern Modifications <strong>in</strong> an Urban Crime Prevention Program’.Journal of Crim<strong>in</strong>al Justice 25(1):19-30.Welsh, B. C. and Farr<strong>in</strong>gton, D.P. (2002) Crime Prevention Effects of Closed Circuit Television: ASystematic Review. Home Office Research Study, 252. London: Home Office.White, G. (1990) ‘Neighbourhood Permeability and Burglary Rates’. Justice Quarterly 7(1):57-67.73


Appendix 1. The <strong>in</strong>formation technology nexusMuch of this <strong>report</strong> concentrates on the pr<strong>in</strong>ciples of prospective <strong>mapp<strong>in</strong>g</strong> and police officers’reactions to it. If systems such as Promap are to become commonplace <strong>in</strong> an <strong>operational</strong> polic<strong>in</strong>g<strong>context</strong>, of equal importance is the practicality of produc<strong>in</strong>g the maps on a rout<strong>in</strong>e basis.The <strong>in</strong>tegration of novel <strong>in</strong>formation technology based analysis tools <strong>in</strong>to an exist<strong>in</strong>g IT framework canproduce several challenges. In this section, possible methods of deliver<strong>in</strong>g them are discussed, somekey issues and problems associated with the development and <strong>in</strong>tegration of them identified, and anumber of solutions (both short- and long-term) to these suggested.In order to produce prospective maps, as a m<strong>in</strong>imum <strong>crime</strong> data relat<strong>in</strong>g to the tim<strong>in</strong>g and location ofprevious events are required and must be extracted from exist<strong>in</strong>g <strong>crime</strong> record<strong>in</strong>g systems. Thismeans that the ability to retrieve, process and analyse these data <strong>in</strong> a timely fashion is of keyimportance to the approach.In the ma<strong>in</strong>, as any new software must <strong>in</strong> effect be grafted onto force IT systems, there are two ma<strong>in</strong>approaches to implement<strong>in</strong>g new analytic software products.1. New software may be <strong>in</strong>tegrated <strong>in</strong>to exist<strong>in</strong>g systems. This solution would mean that datacould be directly accessed by the new software from an <strong>in</strong>ternal structure/datawarehouse, process it and produce output with<strong>in</strong> exist<strong>in</strong>g analysis systems. This option ispresented schematically as Figure A1.1. It would require the least <strong>in</strong>tervention on the partof the analyst and is the preferred option. However, there is typically a reluctance from ITstaff regard<strong>in</strong>g this approach. The reason for this is simple. Where software is notproperly tested, it is possible that the computer program code could have a detrimentalaffect on exist<strong>in</strong>g systems, slow<strong>in</strong>g them down or much worse.Consequently, this option requires considerably more effort <strong>in</strong> terms of systemdevelopment and test<strong>in</strong>g. A programme of formal specification would be required. At leastthree stages are desirable. Program validation would ensure that the software providedsufficient functionality to serve its purpose. Program verification on the other hand wouldbe required to check that the software is implemented correctly. Additionally, an extensivetest<strong>in</strong>g regime would be needed to demonstrate that the system would not have anyunwanted side effects on other elements of the IT <strong>in</strong>frastructure. For even a relatively<strong>in</strong>experienced programmer the latter is unlikely but test<strong>in</strong>g is an important step.In addition, it is worth not<strong>in</strong>g that any direct <strong>in</strong>tegration of a new application <strong>in</strong>to anexist<strong>in</strong>g <strong>in</strong>formation technology <strong>in</strong>frastructure is understandably a complex process. Froma software implementation perspective the majority of police forces currently implementunique data <strong>in</strong>frastructures. This means that all attempts at <strong>in</strong>tegration must be tailored to<strong>in</strong>terface with specific systems, Subsequently successful products are not immediatelytransferable between systems. This issue is currently be<strong>in</strong>g addressed to some extent bythe IMPACT programme, which aims: “To deliver an effective <strong>in</strong>tegrated national, regionaland local <strong>in</strong>formation-shar<strong>in</strong>g and <strong>in</strong>telligence capability, which will improve the ability ofthe police and partner agencies to proactively use <strong>in</strong>formation for <strong>in</strong>telligence purposes toprevent <strong>crime</strong>, br<strong>in</strong>g offenders to justice, safeguard children and vulnerable people andfurther professionalise the <strong>in</strong>vestigation process”.74


Figure A1.1: Internal application utilis<strong>in</strong>g exist<strong>in</strong>g GIS for visualisation2. A stand-alone application may be developed that can process <strong>crime</strong> data exported fromexist<strong>in</strong>g IT systems. The major disadvantage of this approach is that data have to first beextracted, stored on some form of portable media and then imported to the externalapplication. This takes time, particularly where the maximum rate of data transfer possiblefor the portable media used is slow. The use of Universal Serial Bus hard disk dives (USBHDD) or Firewire connections can <strong>in</strong>crease the celerity of data transfer, but suchconnections are typically disabled on police IT systems for reasons of security.Once the data have been processed they can be relayed to the user <strong>in</strong> one of two ways.a) As shown <strong>in</strong> Figure A1.2, data may be imported <strong>in</strong>to an exist<strong>in</strong>g GeographicalInformation System and used to produce maps. A disadvantage with thisapproach is that further time is required to import and manipulate the data, and toadd any required images of the urban backcloth.b) Alternatively, a GIS visualisation tool may be implemented with<strong>in</strong> the stand-aloneapplication to allow maps to be generated and <strong>in</strong>terrogated with<strong>in</strong> it (see FigureA1.3). This has the dist<strong>in</strong>ct advantage that the process of visualis<strong>in</strong>g the data canbe automated and images may be produced to a standard (but modifiable)template.75


Figure A1.2: Stand-alone application utilis<strong>in</strong>g exist<strong>in</strong>g GISFor reasons already discussed, option 2b was used <strong>in</strong> the current project. That is, a stand-aloneapplication was developed which accepts data from a predef<strong>in</strong>ed export procedure <strong>in</strong>stalled on apersonal computer with access to a live <strong>crime</strong> record<strong>in</strong>g system. The application runs on a laptop,provid<strong>in</strong>g all the process<strong>in</strong>g and visualisation elements. As the visualisation component of the systemwas specifically designed for this purpose, the relevant images of the urban backcloth areautomatically selected by the application at the correct level of resolution for the map displayed.76


Figure A1.3: Standalone application with <strong>in</strong>tegrated GISWhilst this was the optimal solution for the current project, option 1 discussed above is the desiredapproach. However, whatever option is used <strong>in</strong> future projects, a number of recommendations withrespect to police IT systems and the record<strong>in</strong>g of data that may be realised <strong>in</strong> the short and longerterm are presented below.Recommendations that may be realised <strong>in</strong> the short term• Crime data should be recorded <strong>in</strong> an accurate and timely manner. Georgaphical grid coord<strong>in</strong>atesshould be accurate to a resolution of one metre and available for analysis with<strong>in</strong> 24hours or less.• All force IT systems should have standard applications that enable data to be exported <strong>in</strong> astandardised format, such as the comma separated (.csv) format which is compatible withmost commercial software, and programm<strong>in</strong>g languages.• Physical access to data should be possible, either us<strong>in</strong>g a CD burner or (for faster datatransfer) USB HDD. Security measures would, of course, be required to restrict access to thedata. Different approaches to encrypt<strong>in</strong>g data should be explored.77


Recommendations that may be realised <strong>in</strong> the longer term• Force IT systems should be developed with standardised <strong>in</strong>teraction architectures, whichallow the <strong>in</strong>cremental addition of analysis elements to both <strong>crime</strong> record<strong>in</strong>g (such as dataclean<strong>in</strong>g) and analysis systems (such as Promap).• Standardise record<strong>in</strong>g and IT architectures across different forces, regions and organisations.This would facilitate the use of the same applications across police forces and thus elim<strong>in</strong>atethe need for bespoke applications. This would also facilitate analysis of cross borderoffend<strong>in</strong>g.78


Appendix 2. <strong>Prospective</strong> Mapp<strong>in</strong>g SurveyPlease read carefully:The UCL Jill Dando Institute of Crime Science has been commissioned by the Home Office and theGovernment Office for the East Midlands (GOEM) to undertake a research project that has beenpiloted <strong>in</strong> Derbyshire ‘A’ Division from August 2005 to February 2006. It is essential with a project ofthis k<strong>in</strong>d that an appropriate evaluation is carried out to understand and assess exactly whathappened and to identify any factors that particularly facilitated or impeded implementation.This survey has been designed by the research team to ga<strong>in</strong> an understand<strong>in</strong>g of how much you knowabout the pilot and how useful you feel the maps were <strong>in</strong> ‘A’ Division, and more specifically, yoursection.Please note that this is an anonymous survey. Your <strong>in</strong>dividual answers will not be seen by anyoneother than our research team and we will not be able to identify you by the answers that you give, norwould we wish to do so.Thank you for tak<strong>in</strong>g the time to fill out this questionnaire.Please turn over to beg<strong>in</strong>79


Section 1: knowledge and understand<strong>in</strong>g of prospective <strong>mapp<strong>in</strong>g</strong>1a) Have you heard of the prospective <strong>mapp<strong>in</strong>g</strong> pilot that is tak<strong>in</strong>g place <strong>in</strong> ‘A’ Division?(please tick)Yes .......................................................................................... (if yes, please proceedto 1b)No............................................................................................ (if no, please proceedto Section 3)1b) In your own words, please briefly say what you understand prospective<strong>mapp<strong>in</strong>g</strong> to be?1c) Have you seen any prospective maps over the last six months?Yes .......................................................................................... (if yes, please proceedto 1d)No............................................................................................ (if no, please proceedto Section 3)1d) Were these maps used by yourself or your supervis<strong>in</strong>g officer for targeted policeactivity (e.g. directed patrols, target<strong>in</strong>g offenders)?Yes ......................................................................................... (if yes, please proceedto 1e)No............................................................................................ (if no, please proceedto 1g)Don’t know .............................................................................. (if don’t know, pleaseproceed to 1g)1e) How often do you (or your supervis<strong>in</strong>g officer) use prospective map(s) for targetedpolice activity?You supervis<strong>in</strong>g officerMore than twice a weekTwice a weekOnce a weekOnce every two weeksOnce every three weeksOnce every monthLess than once a month80


1f) What tactics have you employed, or been <strong>in</strong>volved <strong>in</strong>, <strong>in</strong> response to the maps?Foot patrol around hotspotsDrive through patrols <strong>in</strong> hotspotsTarget-harden<strong>in</strong>g (e.g. locks, alarm systems)Repeat victimisation strategiesTarget<strong>in</strong>g known offendersRedeployable CCTVPublicity campaignsStreet closuresAlleygat<strong>in</strong>gEmployedInvolved <strong>in</strong>Other, please specify: ………………………………………………………………………………………………………………………………………………………………………………………………………………………………….........................1g) How easy do you feel the maps are to <strong>in</strong>terpret?Easy ........................................................................................Fairly easy...............................................................................Fairly difficult ...........................................................................Difficult ....................................................................................I don’t understand the maps ...................................................Extra Comments (please outl<strong>in</strong>e any extra comments you have about your knowledgeand understand<strong>in</strong>g of prospective maps and the tactical options that you haveemployed)Section 2: usefulness of the maps2a) How useful do you feel the maps are <strong>in</strong> your day-to-day work?Very useful ..............................................................................Somewhat useful ...................................................................Not very useful........................................................................Not useful ...............................................................................2b) Have the maps ever identified risky areas that you would not otherwise haveconsidered as be<strong>in</strong>g risky?Often .......................................................................................Sometimes ..............................................................................Never.......................................................................................Yes, but I trusted my own judgement rather than the maps ..81


Extra Comments (please outl<strong>in</strong>e any extra comments you may have about theusefulness of prospective maps, how they might be improved etc.)Section 3: personal details(Please remember that this survey is both confidential and anonymous and the <strong>in</strong>formation you givewill only be used by the research team to help put your answers <strong>in</strong>to <strong>context</strong>.)4a) What is your sex?Male ........................................................................................Female ....................................................................................4b) What is your current rank/position?Police Constable.....................................................................Sergeant .................................................................................Inspector .................................................................................Other (please state)................................................................4c) How long have been <strong>in</strong> your current rank?Less than 1 year ....................................................................1-5 years .................................................................................More than 5 years ...................................................................4d) What Section do you work <strong>in</strong>?Alfreton....................................................................................Belper......................................................................................Ilkeston....................................................................................Long Eaton..............................................................................Ripley ......................................................................................82


Appendix 3. Detailed evaluation methodologyThe purpose of this appendix is to describe the evaluation techniques used that were not discussed <strong>in</strong>the ma<strong>in</strong> body of the <strong>report</strong>. Some of these are novel and have a potentially wider application thanthis project and are thus discussed so that others might use or improve upon them. This section of the<strong>report</strong> is <strong>in</strong>tended to be self-conta<strong>in</strong>ed and so there is some duplication with the text presented <strong>in</strong> thema<strong>in</strong> <strong>report</strong>, although this repetition is m<strong>in</strong>imal. The methods discussed consider changes observedover time, <strong>in</strong> space and <strong>in</strong> space and time, <strong>in</strong> that order.Analyses of change over timeWhich statistical method is most appropriate for establish<strong>in</strong>g the statistical significance of changes <strong>in</strong>levels of <strong>crime</strong> <strong>in</strong> a s<strong>in</strong>gle area over time is the matter of some debate. A number of approaches exist.First are those that consider the overall difference <strong>in</strong> the volume of <strong>crime</strong> before and after <strong>in</strong>tervention.The basic approach is to compare the change <strong>in</strong> the volume of <strong>crime</strong> for a particular unit of time (say12 months) before and after <strong>in</strong>tervention <strong>in</strong> both an action and comparison area. If a reduction isobserved <strong>in</strong> the action but not comparator, or the reduction <strong>in</strong> the former exceeds that <strong>in</strong> the latter thena positive <strong>in</strong>ference may be drawn. To determ<strong>in</strong>e whether the difference <strong>in</strong> the change between thetwo areas is significant, a measure of effect size and the associated standard error is derived.There are a number of approaches to comput<strong>in</strong>g effect sizes for s<strong>in</strong>gle-case designs (Allison andGorman, 1993; Lipsey and Wilson, 2001). Here attention will be given to two techniques: one usedwith<strong>in</strong> the crim<strong>in</strong>ological literature and elsewhere, the other developed with<strong>in</strong> the field of psychologyfor the analysis of behavioural change, but (variants) also used more widely with<strong>in</strong> other fields of<strong>in</strong>vestigation, such as economics.The simplest approach is to compute an odds ratio, which simply compares the change <strong>in</strong> the<strong>in</strong>tervention and comparison areas before and after <strong>in</strong>tervention. An odds ratio of one <strong>in</strong>dicates thatthe changes <strong>in</strong> the two areas were commensurate, suggest<strong>in</strong>g no impact of the scheme. An oddsratio of greater (less) than one suggests a reduction (<strong>in</strong>crease) <strong>in</strong> the <strong>in</strong>tervention area relative to thechange observed <strong>in</strong> the comparison area. The statistical significance of the odds ratio can also becomputed (see Lipsey and Wilson, 2001) by estimat<strong>in</strong>g the standard error of the value derived. Thistechnique, which is readily <strong>in</strong>terpretable, has been frequently used <strong>in</strong> research concerned with whatworks <strong>in</strong> reduc<strong>in</strong>g <strong>crime</strong> (for examples, see Welsh and Farr<strong>in</strong>gton, 2006; Gill and Spriggs, 2005), but isnot without its critics for analyses conducted at the small area level (for which fluctuations over timemay occur even <strong>in</strong> the absence of <strong>in</strong>tervention: Marchant, 2005). However, the problems articulatedabout this approach are likely to be less problematic for analyses conducted at the BCU level, forwhich the variation over time is likely to be relatively stable. Thus, the approach is used here not leastbecause it provides a simple assessment of how th<strong>in</strong>gs changed <strong>in</strong> the pilot area compared to thecomparator.Two approaches are here used to compute the standard errors (s<strong>in</strong>ce these are critical <strong>in</strong> determ<strong>in</strong><strong>in</strong>gthe significance of the effect-size derived), one used by Farr<strong>in</strong>gton and colleagues (see Welsh andFarr<strong>in</strong>gton, 2006), the other by Gill and Spriggs (2005). 10 However, both approaches converged onsimilar estimates and hence only the former are presented.An alternative to us<strong>in</strong>g data which has been aggregated for two periods of time (before and after<strong>in</strong>tervention) is the analysis of time-series data. For this approach, data for a number of <strong>in</strong>tervals are<strong>in</strong>stead analysed. This allows more complex patterns <strong>in</strong> the data to be identified and considered <strong>in</strong>the analysis. For example, time-series analysis can help control for what is known as serialdependence <strong>in</strong> the data: that is, to control for the fact that the residual error for an observation at onetime po<strong>in</strong>t is likely to be highly related to that for an adjacent time po<strong>in</strong>t. If such dependence existswith<strong>in</strong> the data then fail<strong>in</strong>g to correct for it can <strong>in</strong>crease the likelihood of Type I statistical error – thelikelihood of <strong>in</strong>correctly reject<strong>in</strong>g the null hypothesis.10 Gill and Spriggs (2005) use a slightly different approach to calculate the standard by consider<strong>in</strong>g monthly fluctuation <strong>in</strong> thevolume of <strong>crime</strong> to reduce a problem known as over-dispersion.83


In relation to the evaluation of <strong>in</strong>terventions, the method used is known as an <strong>in</strong>terrupted time-seriesdesign (Shadish, Campbell and Cook, 2002). The rationale for the approach <strong>in</strong> the current <strong>context</strong>would be that if an <strong>in</strong>tervention has an impact on the <strong>crime</strong> rate of an area then follow<strong>in</strong>gimplementation the trend <strong>in</strong> the <strong>crime</strong> rate should change. This can occur <strong>in</strong> at least two ways. First,the mean level of the series may change, or there may be a change <strong>in</strong> the slope of the time-seriesfollow<strong>in</strong>g the <strong>in</strong>ception of a scheme. Thus, follow<strong>in</strong>g <strong>in</strong>tervention the average monthly <strong>crime</strong> rate mayfall by an average amount (say 20 <strong>crime</strong>s per month), or there may be a downwards trend with the<strong>crime</strong> rate fall<strong>in</strong>g by an <strong>in</strong>cremental amount each month.The basic method used is to first analyse the data for the pre-<strong>in</strong>tervention series. The purpose of sodo<strong>in</strong>g is to derive a set of parameters that describe monthly (or some other <strong>in</strong>terval of time) changes <strong>in</strong>the <strong>crime</strong> rate before implementation. These parameters <strong>in</strong>clude any trend <strong>in</strong> the series (l<strong>in</strong>ear orotherwise), the <strong>in</strong>tercept of the series (the value at time zero), and the extent of serial-correlation <strong>in</strong> thedata. Other parameters may also be modelled but are not discussed here for parsimony. Once theseparameters have been estimated they can be used to see how well they describe the post-<strong>in</strong>terventiontime-series. Moreover, and importantly, the aim of the analysis is to see if the tim<strong>in</strong>g of <strong>in</strong>tervention,modelled as a b<strong>in</strong>ary variable (or a cont<strong>in</strong>uous variable if data on the <strong>in</strong>tensity of implementation areavailable) expla<strong>in</strong>s a significant amount of the variation <strong>in</strong> the time-series that is not already expla<strong>in</strong>edby the parameters estimated <strong>in</strong> the earlier steps of the analysis.In many fields of <strong>in</strong>vestigation, data are often available for long time-series (say 30-50 months) beforeand after <strong>in</strong>tervention and this allows reliable analyses to be conducted. In the field of <strong>crime</strong> reduction,the length of the series is typically shorter. In the current evaluation, although a long series wasavailable for the pre-<strong>in</strong>tervention series, the post-<strong>in</strong>tervention was fairly short, at only seven months.Even where a time-series is short Shadish et al. (2002) recommend the use of time-series analysis,even if the analysis undertaken is simply visual <strong>in</strong>spection of the trend.However, time-series approaches have also been adopted <strong>in</strong> other fields of <strong>in</strong>vestigation for which thelength of the series is frequently much shorter. For example, <strong>in</strong> review<strong>in</strong>g the methods available forthe calculation of effect sizes for s<strong>in</strong>gle-case designs where a control group is unavailable, Allison &Gorman (1993) propose a method for the analysis of shorter time-series. The rationale beh<strong>in</strong>d theapproach is that <strong>in</strong> the absence of <strong>in</strong>tervention, the time-series before <strong>in</strong>tervention can be used topredict that afterwards. Their approach uses ord<strong>in</strong>ary least squares (OLS) regression to diagnose thegeneral trend before <strong>in</strong>tervention, and the result<strong>in</strong>g regression equation is applied to the data post<strong>in</strong>tervention.Their formulation allows both changes <strong>in</strong> <strong>in</strong>tercept and slope to be identified. Formally:Y = b 0 + b 1 X + b 2 X(t-n a ) + eWhere,Y is the residual error from the <strong>in</strong>itial OLS modelb 0 is the estimate of the <strong>in</strong>terceptb 1 is the estimate of the change <strong>in</strong> <strong>in</strong>tercept associated with the <strong>in</strong>terventionb 2 is the estimate of any change <strong>in</strong> slope associated with the <strong>in</strong>terventiont is the time po<strong>in</strong>te is the error termWhere data concerned with changes <strong>in</strong> a control group are unavailable, this approach would help rulea number of threats to <strong>in</strong>ternal validity; that is, factors other than an <strong>in</strong>tervention that might expla<strong>in</strong> thepattern observed. Such threats <strong>in</strong>clude (for example) regression to the mean and history. Regressionto the mean may occur where an area is selected for <strong>in</strong>tervention on the basis of an extreme pre<strong>in</strong>tervention<strong>crime</strong> rate, and where the rate is extreme not only compared to other areas but relative toitself at other times. The problem is that the observed elevation <strong>in</strong> the <strong>crime</strong> rate may be expla<strong>in</strong>ed bytemporary phenomena. Thus, even <strong>in</strong> the absence of <strong>in</strong>tervention the <strong>crime</strong> rate would soon regressback to the level typical for that area. With a suitably long time-series of data, such effects can beidentified and modelled. Similarly, history occurs where there is a downwards trend <strong>in</strong> the <strong>crime</strong> rate84


prior to <strong>in</strong>tervention, or specific events unrelated to the <strong>in</strong>tervention occur that might impact upon the<strong>in</strong>cidence of <strong>crime</strong>.However, one limitation of the type of analysis discussed above is that it is <strong>in</strong>sensitive to more generalchanges that might occur. Consider that there may be changes <strong>in</strong> policy that would have a genericeffect on the rate of burglary. For example, a county-wide policy <strong>in</strong>troduced on a particular date wouldbe expected to impact upon burglary across the entire area. Unless such a policy were identified itcould not be modelled us<strong>in</strong>g the type of analytic design discussed above. Changes <strong>in</strong> record<strong>in</strong>gpractices, such as those <strong>in</strong>troduced as part of the National Crime Record<strong>in</strong>g Standard, may also affectthe time-series.Thus, a variant of the above approach for which changes <strong>in</strong> a comparison area are used to de-trendthe time-series <strong>in</strong> the first step of the analysis are here used to <strong>in</strong>crease the validity of the analysis. Bydo<strong>in</strong>g so, this means that any changes <strong>in</strong> the action area that may be expla<strong>in</strong>ed by factors such asthose already discussed can be estimated and removed from the time-series.For the current evaluation a fairly long pre-<strong>in</strong>tervention time series facilitated a reliable diagnosticanalysis of the pre-<strong>in</strong>tervention time-series. However, many researchers recommend that wherepossible it is wise to employ a range of statistical approaches to the analysis of data. The advantageof so do<strong>in</strong>g is that where the results of the analysis converge, one can be more confident thatconclusions drawn are not based on the specific biases of a particular statistical procedure. For thisreason, <strong>in</strong> this <strong>report</strong> analyses are conducted us<strong>in</strong>g both the odds ratio approach discussed above anda variant of the approach to the analysis of short time-series proposed by Allison & Gorman (1993).Odds ratio analysisTo calculate the odds ratios, the count of <strong>crime</strong> for the seven months before and dur<strong>in</strong>g the pilot werecontrasted. The standard errors were computed <strong>in</strong> the usual way (see Lipsey and Wilson, 2001) aswell as us<strong>in</strong>g monthly variation as suggested by Gill and Spriggs (2005). Table A3.1 shows the countof burglary before and dur<strong>in</strong>g the pilot along with the OR, and associated confidence <strong>in</strong>tervals and z-score. The confidence <strong>in</strong>tervals shown, calculated us<strong>in</strong>g the traditional approach <strong>in</strong>dicate the upperand lower estimates of the odds ratios. These suggest that the true odds ratio lies somewherebetween 0.99 and 1.34. The z-score provides an <strong>in</strong>dication of the likely statistical significance of theOR. For a two-tailed test, the z-score is required to exceed 1.96. On the basis of these results, theanalysis would suggest that the reduction <strong>in</strong> burglary observed <strong>in</strong> ‘A’ Division exceeded that <strong>in</strong> thecomparison area, but that the trend was marg<strong>in</strong>ally non-significant.Table A3.1: Change <strong>in</strong> the volume of burglary and odds-ratio statisticsBefore After GrosschangeOddsratioConfidence<strong>in</strong>tervalsz-scorePilot 663 554 109 1.15 0.99-1.34 1.80Comparisonarea684 659 2585


Time-series analysisFor the purposes of illustration, Figure 6.1 (<strong>in</strong> the ma<strong>in</strong> body of the <strong>report</strong>) shows a time-series graphof the change <strong>in</strong> the count of burglary <strong>in</strong> the action and control areas for a period of two years before<strong>in</strong>tervention up until the end of the evaluation period. As a first step, an OLS analysis, with themonthly count of burglary <strong>in</strong> the action area for the period prior to implementation was regressedaga<strong>in</strong>st that <strong>in</strong> the comparator. Also <strong>in</strong>cluded <strong>in</strong> the model was an (<strong>in</strong>dependent) variable which<strong>in</strong>dicated the time po<strong>in</strong>t (see above). This analysis <strong>in</strong>dicated that changes <strong>in</strong> the comparison area, ‘C’Division, were significantly associated with those <strong>in</strong> the action area (ß=0.33, ß(s.e)=0.09, t(51)=3.90,p


expla<strong>in</strong>ed by those <strong>in</strong> the control area, there was no additional temporal trend (upwards ordownwards) <strong>in</strong> the changes observed (ß=-0.01, ß(s.e)=0.01, t(51)=-1.14, p=0.26).Aga<strong>in</strong>, a corrolellogram confirmed that the data were serially correlated, conform<strong>in</strong>g to an AR1 model,and thus this model was used to see if the reduction observed was co<strong>in</strong>cident with the tim<strong>in</strong>g of thepilot. The results of the analysis confirmed that a significant amount of the variance <strong>in</strong> the weeklyburglary count <strong>in</strong> the Division was expla<strong>in</strong>ed by serial autocorrelation (ß=0.74, ß(s.e)=0.04,t(245)=17.22, p


Figure A3.1: Changes <strong>in</strong> the spatial distribution of risk follow<strong>in</strong>g the <strong>in</strong>troduction of the pilotIt is important to bear <strong>in</strong> m<strong>in</strong>d that this is a purely visual and descriptive analysis. Moreover, thepatterns are relative and do not necessarily <strong>in</strong>dicate where the risk of burglary was greatest, but justwhere it changed the most. Nevertheless, what Figure A3.1 does illustrate is that risk moves evenwhen considered over fairly lengthy <strong>in</strong>tervals of time, such as seven months. This mobility of risk isone of the underp<strong>in</strong>n<strong>in</strong>g justifications of Promap.With respect to statistical significance, an analytic approach worthy of discussion has been developedby Ratcliffe (2005). The aim of this is to detect changes <strong>in</strong> the spatial placement of <strong>crime</strong> over timewith<strong>in</strong> a particular area, such as a BCU. Us<strong>in</strong>g a Monte-Carlo simulation, the spatial patternsobserved can be compared aga<strong>in</strong>st the null hypothesis that any changes observed could haveoccurred on the basis of chance. Consequently, the test developed provides an <strong>in</strong>ferential statisticaltest of the visual analysis presented <strong>in</strong> Figure A3.1.88


A still further approach to explor<strong>in</strong>g the stability <strong>in</strong> burglary risk is to compute the correlation betweenthe count of burglary across a series of areas encapsulated by the BCU before and dur<strong>in</strong>g the pilot. Alarge correlation would suggest that the distribution of risk was stable, a small coefficient that it wasfluid. To do this, areas at different levels of geographical resolution could be used. For example, onecould exam<strong>in</strong>e the correlation at the level of a town or for a grid of smaller regular sized cells.Obviously, the larger the area considered, the more stable the patterns would be expected to be.Thus, analyses were conducted at two levels of geographic resolution, first at the census output arealevel, and second for a series of 1kmX1km cells. There are a total of 29 census output areas <strong>in</strong> ‘A’Division and at this level of resolution the rank-order correlation of .89 (p


Figure A3.2: Lorenz curves show<strong>in</strong>g the distribution of burglary riskCumulative percentage of burglary100908070605040302010Cumulative % afterCumulative % before00 5 10 15 20 25 30 35 40 45 50 55 60 65 70 75 80 85 90 95100Cumulative percentage of 1km areasThe general pattern for both periods of time confirms what the authors already knew, that burglary ishighly concentrated <strong>in</strong> space. It also shows that there was little change <strong>in</strong> the spatial concentration ofburglary follow<strong>in</strong>g the start of the pilot. This is slightly disappo<strong>in</strong>t<strong>in</strong>g. With fuller implementation, itwould become worthwhile to compare Lorenz curves for pilot and comparison areas, s<strong>in</strong>ce there maybe a general tendency for <strong>crime</strong>s as they become rarer also to have a very different distribution.Changes <strong>in</strong> patterns <strong>in</strong> space and timeThe burglary pattern which gives prospective <strong>mapp<strong>in</strong>g</strong> its superiority over retrospective <strong>mapp<strong>in</strong>g</strong> is itsspatio-temporal cluster<strong>in</strong>g. The traditional def<strong>in</strong>ition of a geographical hotspot is an area for which<strong>crime</strong> is particularly concentrated <strong>in</strong> space for a period of time such as one year or six months. Thus,hotspots are essentially the accumulation of pairs of <strong>crime</strong>s which occur close to each other with<strong>in</strong> thetime period of <strong>in</strong>terest. In consequence, the analysis of hotspots does not consider the tim<strong>in</strong>g 12 ofevents, other than requir<strong>in</strong>g them to have occurred with<strong>in</strong> the <strong>in</strong>terval of <strong>in</strong>terest, say over the last sixmonths. The analyses so far presented have looked at distributions <strong>in</strong> time and space separately. Analternative and more sensitive approach to the exam<strong>in</strong>ation of spatio-temporal patterns of <strong>crime</strong> wouldbe to identify clusters or series of event pairs that occur not only close <strong>in</strong> space but also <strong>in</strong> time. Puttoo simply, one would expect prospective <strong>mapp<strong>in</strong>g</strong> to reduce the length of series of burglaries close <strong>in</strong>time and space.The identification of such clusters and their length would have useful implications for <strong>crime</strong> reduction<strong>in</strong> at least two ways. First, this would provide the police with an idea of the tempo of localised<strong>in</strong>creases <strong>in</strong> burglary risk. For example, if the longest clusters that could be identified consisted ofonly two events, this would suggest that the elevated risk <strong>in</strong> an area had a fairly slow tempo, whereasif clusters of ten events were rout<strong>in</strong>ely identified this would suggest a higher frequency of space-timecluster<strong>in</strong>g. This form of analysis chimes with the Promap approach. It is also novel. The reader is<strong>in</strong>vited to th<strong>in</strong>k of what follows <strong>in</strong> this light, namely as an exploratory approach which no doubt needsref<strong>in</strong>ement but is more suited to the technique it aspires to understand and evaluate. This type ofanalysis is useful for evaluation research by enabl<strong>in</strong>g the detection of qualitative changes <strong>in</strong> spatiotemporalpatterns of <strong>crime</strong>. It is perhaps easier to illustrate this po<strong>in</strong>t by start<strong>in</strong>g with a special case of12 By tim<strong>in</strong>g, the authors mean the time between events rather than the regularity of the time of day that <strong>crime</strong>s occur. The latterhas been usefully explored by Ratcliffe (2002).90


space-time cluster<strong>in</strong>g: repeat victimisation. Consider<strong>in</strong>g evaluations of area-based <strong>in</strong>terventions, it ispossible to not only measure changes <strong>in</strong> burglary <strong>in</strong>cidence (the rate per 1,000 households) follow<strong>in</strong>gan <strong>in</strong>tervention but also how concentrated on <strong>in</strong>dividual properties <strong>crime</strong> is. For example, for an<strong>in</strong>tervention aimed at reduc<strong>in</strong>g repeat victimisation, simply exam<strong>in</strong><strong>in</strong>g the change <strong>in</strong> the <strong>in</strong>cidence ofburglary may be <strong>in</strong>sufficient to detect the full impact of a scheme, or the potential <strong>crime</strong> reductionmechanisms through which any change was realised. Instead, a more sensitive analysis (seeForrester et al., 1990) would be to exam<strong>in</strong>e the rate of repeat victimisation. A reduction <strong>in</strong> this type ofvictimisation would suggest an impact of the scheme, although a reduction <strong>in</strong> <strong>in</strong>cidence would berequired to demonstrate that target-switch displacement did not occur. On the other hand, a reduction<strong>in</strong> <strong>in</strong>cidence with<strong>in</strong> an area that was unaccompanied by a reduction <strong>in</strong> repeat victimisation wouldprovide less conv<strong>in</strong>c<strong>in</strong>g evidence that any reduction could reasonably be attributed to the scheme.In the same way, where strategies are employed to suppress emerg<strong>in</strong>g or endur<strong>in</strong>g hotspots of <strong>crime</strong>,as was the case <strong>in</strong> the current pilot, one desired outcome of the scheme would be to truncate thelength of space-time clusters of burglary. That is, if resources are directed to the right places at theright times <strong>in</strong> a way that anticipates where the next event <strong>in</strong> a cluster is most likely to occur, then itwould be hoped that emerg<strong>in</strong>g spatio-temporal clusters of <strong>crime</strong> would be targeted before they have achance to propagate.To exam<strong>in</strong>e this issue, software was developed to identify series of events that occurred close <strong>in</strong> bothspace and time, rang<strong>in</strong>g from two events (pairs) onwards. The approach allowed the frequency ofseries of different (k-event) lengths (e.g. pairs, triples, quads and so on) to be summarised andcompared for the periods before and dur<strong>in</strong>g the pilot.The identification and summary of series of events can be done <strong>in</strong> a variety of ways. Here, for everyburglary (the reference) event, any antecedent burglary that occurred with<strong>in</strong> a critical distance andtime of it was identified and added to the series. Us<strong>in</strong>g this approach only burglaries that occurredwith<strong>in</strong> the critical time and distance of the reference event could be identified. This precludes theidentification of other burglaries that might be l<strong>in</strong>ked to the others <strong>in</strong> a cluster. This problem isillustrated conceptually <strong>in</strong> Figure A3.3. In the top and bottom of Figure 6.8, there are four burglariesthat occurred with<strong>in</strong> a few days of each other. In the first cha<strong>in</strong>, all burglaries occur with<strong>in</strong> the criticalspatial distance of the reference event (the leftmost event) and thus one identifies a cha<strong>in</strong> of fourburglaries. For the second series, for the same reference event one would identify a cha<strong>in</strong> of onlythree burglaries as the f<strong>in</strong>al event occurred further away from the reference event than the criticaldistance. However, it occurred with<strong>in</strong> the critical distance of other events <strong>in</strong> the cha<strong>in</strong> and henceshould be <strong>in</strong>cluded <strong>in</strong> the series.Figure A3.3: An illustration of a triple (bottom) and quad cha<strong>in</strong> (top)Critical distanceAn alternative approach would be to <strong>in</strong>clude <strong>in</strong> a cluster all burglaries that are with<strong>in</strong> the criticaldistance and time of one or more events already identified as part of that series. Us<strong>in</strong>g this approach,both series shown <strong>in</strong> Figure A3.3 would be classified as be<strong>in</strong>g a four event series. In what follows thecritical distance and time used were 400m and one-week, respectively. Other def<strong>in</strong>itions could beused, and other analyses (not shown) us<strong>in</strong>g different def<strong>in</strong>itions revealed a similar pattern of results.91


To recapitulate and elaborate, the approach taken may be summarised as shown below:1. The burglary data were sorted <strong>in</strong> date order.2. For each period of time (before and dur<strong>in</strong>g the pilot), the previous week’s events were used asa historic buffer period to allow all events that occurred with<strong>in</strong> seven days of another to beidentified.3. Each burglary event was then considered <strong>in</strong> sequential order.a. For the first event considered, only the historic data were searched to see if earlierburglaries occurred with<strong>in</strong> the critical thresholds of the first event; where they did theywere added to the series for that reference event.b. For the second event considered, all of the historic data (<strong>in</strong>clud<strong>in</strong>g the first referenceevent) were searched, and events that belonged to a series identified as per step a.c. Once all <strong>crime</strong>s had been considered, for every event it was possible to calculate themaximum length of the cha<strong>in</strong> for which that event was the term<strong>in</strong>al event and howmany cha<strong>in</strong>s of every length were identified.Us<strong>in</strong>g this approach, it was possible to answer the question, ‘when a burglary occurs how many<strong>crime</strong>s previously occurred nearby <strong>in</strong> space and time?’ It is, of course, possible that any cluster soidentified could be part of a longer cluster which <strong>in</strong>cluded events that subsequently occurred.Expressed a slightly different way, clusters identified <strong>in</strong> this way may overlap with one another withone cluster <strong>in</strong>clud<strong>in</strong>g some events of another – although for any particular series length no twoclusters would <strong>in</strong>clude exactly the same events – there would be at least one different <strong>crime</strong> <strong>in</strong> thelonger cha<strong>in</strong> (the shorter be<strong>in</strong>g a subset of the other).Hav<strong>in</strong>g summarised the data <strong>in</strong> this way, it was possible to calculate what proportion of burglarieswere the term<strong>in</strong>al event for different lengths of space-time series. The results, shown as Figure A3.4,illustrate that around one-third of events occurred with<strong>in</strong> 400m and one week of at least oneantecedent both before and dur<strong>in</strong>g the pilot. Around 15 per cent of events occurred nearby and with<strong>in</strong>one-week of at least two others. For the two <strong>in</strong>tervals of time considered, the longest series identifiedconsisted of 12 burglaries that occurred close to each other <strong>in</strong> both space and time. Before discuss<strong>in</strong>gthe differences for the two periods of time, it is important to note the implication of this f<strong>in</strong>d<strong>in</strong>g, which isthat it clearly illustrates the flux of <strong>crime</strong>. If burglaries occurred <strong>in</strong> the same places all the time, eitherconsiderably longer series would have been identified, or a higher proportion of events would belongto longer series. This emphasises the need for a dynamic predictive capability for the deployment of<strong>crime</strong> reductive resources. Simply target<strong>in</strong>g the same areas over time is unlikely to direct resources tothe right places at the right times.92


Figure A3.4: The proportion of events belong<strong>in</strong>g to different k-event series before and dur<strong>in</strong>gthe pilot40% of events that are the last <strong>in</strong> a k- event (ormore) series3530252015105AfterBefore02 3 4 5 6 7 8 9 10 11 12Cha<strong>in</strong> length (k -events)Consider<strong>in</strong>g the patterns for the periods before and dur<strong>in</strong>g the pilot, there are some differences. First,the longest series (12 events, of which there were three examples) identified occurred <strong>in</strong> the periodbefore <strong>in</strong>tervention. More generally, longer series were identified <strong>in</strong> the period before the pilot, thandur<strong>in</strong>g it. Conversely, dur<strong>in</strong>g the pilot there was a slightly higher proportion of shorter series (two orthree events). On the face of it, this f<strong>in</strong>d<strong>in</strong>g is <strong>in</strong> l<strong>in</strong>e with what would be expected if the pilot had beensuccessful. However, the reader should be m<strong>in</strong>dful of two th<strong>in</strong>gs.a. For the period dur<strong>in</strong>g the pilot, a smaller number of burglaries were committed, whichmay have affected the pattern of results. For what it is worth, sampl<strong>in</strong>g only the samenumber of events for the period before (the first 554 events) as that after generatedexactly the same pattern of results. Consequently, differences <strong>in</strong> sample sizes wouldnot appear to expla<strong>in</strong> the results observed.b. Perhaps more importantly, the effect observed was very subtle. This is notunexpected given that implementation, or rather the use of the system, was at bestonly m<strong>in</strong>imally realised. With such a small effect size, and under the circumstances ofpartial implementation, it is <strong>in</strong>appropriate to conduct <strong>in</strong>ferential statistical tests. 13Thus, this f<strong>in</strong>d<strong>in</strong>g is <strong>in</strong>terpreted as be<strong>in</strong>g <strong>in</strong>conclusive, but the analytic approachderived suggested a useful method for future research concerned with the stability ofclusters of <strong>crime</strong>.13 Such a test would <strong>in</strong>volve compar<strong>in</strong>g the observed distribution of k-event series with what would be expected if the tim<strong>in</strong>g andlocation of events were random. Thus, a variant of the Monte-Carlo approach used elsewhere <strong>in</strong> this <strong>report</strong> would seemappropriate.93


Conclud<strong>in</strong>g comments on methodThe techniques described illustrate a number of ways <strong>in</strong> which particular ‘signatures’ that mightbespeak mechanism may be sought. Only by conduct<strong>in</strong>g such analyses is it possible to differentiatebetween the likely contributions of different plausible mechanisms of <strong>crime</strong> reduction. Unfortunately,methods of this k<strong>in</strong>d are <strong>in</strong> their <strong>in</strong>fancy and hence there is a need to develop and dissem<strong>in</strong>ate thosethat might have wider application.94


Appendix 4. Promap graphical user <strong>in</strong>terface and anillustration (step by step) of how the system is usedThis appendix provides further detail concern<strong>in</strong>g the Promap <strong>in</strong>terface, how it is used, and the outputgenerated. The maps produced show anticipated risks at various levels of geographic resolution, thef<strong>in</strong>est be<strong>in</strong>g at the household level. However, for the purposes of anonymity, all of the maps shownhere are at a fairly coarse level of resolution and the predictions shown are fictitious rather thanreflect<strong>in</strong>g the actual distribution of <strong>crime</strong> risk.For the purposes of elaboration, the notes that follow describe <strong>in</strong> a step-by-step fashion how thesoftware is used. These are a version of the <strong>in</strong>structions provided to the <strong>crime</strong> analysts.Step 1:Load the Promap application.Figure A5.1: The Promap applicationStep 2:If you wish to produce a prospective map for the current date, select the ‘today’ radio button (seeFigure A5.1). If you wish to change the test date select ‘other’ and use the date selection box. If youare produc<strong>in</strong>g a map for a specific shift – enable the shift analysis mode with the tick box and then usethe radio buttons to select which shift the map should be tailored for (see Figure A5.2).95


Figure A5.2: An enlargement of the shift analysis optionsStep 3:Once you are happy with your selection, click the 'Generate PROMAP' button, this will perform theanalysis and generate the prospective maps required. While these calculations take place a‘process<strong>in</strong>g data’ message will rema<strong>in</strong> <strong>in</strong> the foreground of the map w<strong>in</strong>dow.Step 4:When analysis is complete the process<strong>in</strong>g message will disappear and the prospective map of yourarea will become visible (as below). The key <strong>in</strong> the bottom left of the map <strong>in</strong>dicates the fraction of thearea identified. This ranges from the five per cent (shaded yellow), two per cent (shaded orange) andone per cent (shaded blue) of the total area predicted to be most at risk of victimisation. Thus,accord<strong>in</strong>g to the forecast, the blue area is that which should be prioritised first.Figure A5.3: An example of fictitious prospective map© Crown Copyright. All rights reserved. Derbyshire Constabulary 100021015.96


Step 5:Once the prospective map has been generated, navigational controls <strong>in</strong> the bottom right of the w<strong>in</strong>dow(shown <strong>in</strong> Figure A5.4) allow further user <strong>in</strong>terrogation of the map. Brief descriptions of the functionsare shown below.Figure A5.4: Map navigational options• The control allows the user to navigate the map at the current level of magnification,mov<strong>in</strong>g the map <strong>in</strong> comb<strong>in</strong>ations of East/West and North/South.• The button zooms <strong>in</strong>to the map w<strong>in</strong>dow provid<strong>in</strong>g more detail for a specific area. Thiscan be done by click<strong>in</strong>g at a particular po<strong>in</strong>t on the map or dragg<strong>in</strong>g a box around the area toview. Promap will dynamically switch between the relevant Ordnance Survey map layers forthe level of zoom selected.• The magnify<strong>in</strong>g glass zooms out of the map w<strong>in</strong>dow.Figure A5.5: <strong>Prospective</strong> map magnified to neighbourhood level.© Crown Copyright. All rights reserved. Derbyshire Constabulary 100021015.97


Figure A5.6: <strong>Prospective</strong> map magnified to street level© Crown Copyright. All rights reserved. Derbyshire Constabulary 100021015.Figure A5.7: <strong>Prospective</strong> map magnified to household level. © Crown Copyright. All rights reserved. Derbyshire Constabulary 100021015.98


Us<strong>in</strong>g the navigational tools, it is possible to <strong>in</strong>terrogate the map at the level of resolution desired.Such analysis may be comb<strong>in</strong>ed with other <strong>in</strong>telligence to help further prioritise resource allocationwith<strong>in</strong> the areas identified and to ref<strong>in</strong>e tactical options.The 'export view as image' button does exactly what it says – it exports the current map w<strong>in</strong>dow viewas a gif image for <strong>in</strong>clusion <strong>in</strong> documents or brief<strong>in</strong>gs. By default all captured images can be found <strong>in</strong>‘C:\promap\exported_images\’ and are given a name based upon the area <strong>in</strong> question, and the typeand date of analysis performed.99


Produced by the Research Development and Statistics Directorate, HomeOfficeThis document is available only <strong>in</strong> Adobe Portable Document Format (PDF)through the RDS websitehttp://www.homeoffice.gov.uk/rdsEmail: public.enquiries@homeoffice.gsi.gov.ukISBN: 978 1 84726 532 6© Crown copyright 2007

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!